| News | Staff | Projects | Awards | Patents | Results | Conferences | Collaboration | ISL ISoCPS | Publications | Events | Matherials |
 | Links | Contacts |
rus | eng |
  


Personal | Interests | Awards | Projects | Publications | 

Doynikova (Fedorchenko) Elena Vladimirovna

Citizenship: Russia
Address academic (office):
St.Petersburg Institute for Informatics and Automation of the Russian Academy of Sciences
39, 14th Liniya, St.-Petersburg, 199178, Russia
Tel.:+7-(812)-328-2642
Fax: +7-(812)-328-4450
Position:Senior Research Fellow

Elena Vladimirovna Doynikova (Fedorchenko), Senior Research Fellow of Laboratory of Computer Security Problems of the St.Petersburg Federal Research Ceneter of the Russian Academy of Sciences, graduated from St. Petersburg Electrotechnical University LETI in 2009.

E-mail: doynikova[AT]comsec[DOT]spb[DOT]ru
http://comsec.spb.ru/doynikova/

Top 

Research interests

  • Computer network security, information security risk analysis methods, risk management.

Top 

Identifiers

Top 

Awards

2019

  • Doynikova (Fedorchenko) Elena Vladimirovna - 1st place in the section "Transport Systems" at the III International Scientific Conference "Science of the Future" for the project "Self-learning hardware and software robotic complex for emergency situations".

2018

  • Doynikova (Fedorchenko) Elena Vladimirovna - Winner of the St. Petersburg competitive selection for young scientists and PhD. Project title: "Ontology of security metrics and its application for security assessment and responding to cyber attacks in the information systems".

2015

  • Doynikova (Fedorchenko) Elena Vladimirovna - Awarded the Medal of the Russian Academy of Science in area of Computer Science, Computer Engineering and Automation (Decree of the Presidium of RAS 24 dated 17.02.2015).

  • Doynikova (Fedorchenko) Elena Vladimirovna - Winner of the St. Petersburg competitive selection for young scientists and PhD. Project title: "Methods and algorithms development for generation of attack scenarios on the network for its security level evaluation".

  • Doynikova (Fedorchenko) Elena Vladimirovna - The winner of the competitive selection for the grants of St. Petersburg in the area of scientific and technical activities. Competition organizer: Committee on Science and Higher Education of St. Petersburg. Project title: "Models, methods and software development for dynamic evaluation of computer network security in the perspective security information and event management system".

2014

  • Doynikova (Fedorchenko) Elena Vladimirovna - Winner of the Young School competition in the Positive Hack Days conference IV (http://phdays.ru). The second place. Presentation topic: "Dynamic Assessment of Computer Networks Security in SIEM Systems".
  • Doynikova (Fedorchenko) Elena Vladimirovna - Diploma with Honors for the most effective solution on the Microsoft summer school Doing Research in the Cloud 2014.

2013

  • Doynikova (Fedorchenko) Elena Vladimirovna - Igor Kotenko and Elena Doynikova are a laureates of the best paper award on the IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS'2013). Berlin, Germany, September 12-14, 2013.
  • Doynikova (Fedorchenko) Elena Vladimirovna - Elena Doynikova winner of the competitive selection process for the provision of the 2013 grants to young scientists, young PhD of universities, industry and academic institutions located in St. Petersburg.

Top 

Patents and Programms

Patents for inventions and utility models, applications for them

  1. Vasily Desnitsky, Elena Doynikova, Igor Kotenko, Igor Parashchuk, Igor Saenko, Andrey Chechulin. Device for parametric estimation of the distribution law of message streams. Patent No. 2750287. Registered in the State Register of Inventions of the Russian Federation on 25.06.2021. The validity period of the exclusive right to the invention expires on 11.07.2040.
  2. Vasily Desnitsky, Igor Kotenko, Igor Parashchuk, Igor Saenko, Andrey Chechulin, Elena Doynikova. Information retrieval device. Patent No. 2724788. Registered in the State Register of Inventions of the Russian Federation on 25.06.2020. The validity period of the exclusive right to the invention expires on 14.10.2039.

Programs and databases

2020

  1. Vasily Desnitsky, Elena Doinikova. A component of modeling a wireless sensor network for solving security analysis and verification tasks. Certificate No. 2020610060. Registered in the Computer Program Registry 09.01.2020.

  2. Alexander Branitskiy, Elena Fedorchenko, Igor Kotenko Component for the destructive influences detection based on text classifiers in social network groups . Certificate No. 2020666158. Registered in the Computer Program Registry 04.12.2020.

  3. Elena Fedorchenko, Andrey Fedorchenko, Alexander Branitskiy Component for the security data normalization by automated preprocessing of fragmented semi-structured data. Certificate No. 2020665838. Registered in the Computer Program Registry 01.12.2020.

  4. Elena Fedorchenko, Andrey Fedorchenko Component for the security incidents detection by building and processing a knowledge graph. Certificate No. 2020665818. Registered in the Computer Program Registry 01.12.2020.

  5. Elena Fedorchenko, Lidia Vitkova, Alexey Pronichev, Igor Saenko. Component for choosing countermeasures against unwanted, questionable and malicious information. Certificate No. 2020665591. Registered in the Computer Program Registry 27.11.2020.

2019

  1. Elena Doynikova, Igor Kotenko. A component for calculating metrics to support decision making on countering inappropriate information on the Internet. Certificate No 2019664198. Registered in the Computer Program Registry 01.11.2019.

  2. Alexander Branitskiy, Elena Doynikova, Igor Kotenko. Neural network module for users of a social network classification according to the psychological scales of the Ammon's test. Certificate No 2019664410. Registered in the Computer Program Registry 06.11.2019.

2018

  1. Andrey Fedorchenko, Elena Doynikova, Igor Saenko. Component of automated typization of heterogeneous information objects for analysis of unwanted information. Federal Service for Intellectual Property. Certificate No 2018663495. Registered in the Computer Program Registry 29.10.2018.

  2. Elena Doynikova, Andrey Fedorchenko, Igor Kotenko. Component for ranking measures to counter remote information in the Internet. Federal Service for Intellectual Property. Certificate No 2018663642. Registered in the Computer Program Registry 01.11.2018.

  3. Elena Doynikova. Component for security assessment with the use of ontological security data repository. Federal Service for Intellectual Property. Certificate No 2018663646. Registered in the Computer Program Registry 01.11.2018.

  4. Elena Doynikova, Andrey Fedorchenko. Component of vulnerabilities classification based on their informal characteristics to identify weaknesses of information systems. Federal Service for Intellectual Property. Certificate No 2018664027. Registered in the Computer Program Registry 08.11.2018.

2017

  1. Elena Doynikova, Igor Kotenko, Igor Saenko. Subsystem for countermeasures automatic selection in computer networks based on graph models in static and dynamic modes of operation. Federal Service for Intellectual Property. Certificate No 2017619725. Registered in the Computer Program Registry 01.09.2017.

  2. Elena Doynikova, Andrey Chechulin, Andrey Fedorchenko. Component for data normalization from external sources for building a hybrid security repository. Federal Service for Intellectual Property. Certificate No 2017663405. Registered in the Computer Program Registry 01.12.2017.

  3. Andrey Fedorchenko, Andrey Chechulin, Elena Doynikova. Component for analysis of semi-structured databases for building a hybrid security repository. Federal Service for Intellectual Property. Certificate No 2017663404. Registered in the Computer Program Registry 01.12.2017.

2016

  1. Elena Doynikova, Igor Kotenko. Component for information security risks evaluation for network assets based on security events analysis. Certificate 201614489. Registered in the Computer Program Registry 25.04.2016.

  2. .., .. . 2016663492. 08.12.2016.
  3. .. . 2016663928. 19.12.2016.

2015

  1. Elena Doynikova, Andrey Chechulin. Generator of random attack sequences for testing of networks of Internet of Things. Federal Service for Intellectual Property. Certificate No 2015615368. Registered in the Computer Program Registry 15.05.2015.

  2. Elena Doynikova, Igor Kotenko. Component for assessment of the assests criticality on the base of service dependencies model for testing of the security components of networks of Internet of Things. Certificate No 2015615374. Registered in the Computer Program Registry 24.03.2015.

  3. Andrey Chechulin, Elena Doyninkova. Component for analysis of the attack models for the protection of the information and telecommunication systems. Federal Service for Intellectual Property. Certificate N 2015662026. Registered in the database Registry 16.11.2015.

2014

  1. Igor Kotenko, Elena Doynikova, Andrey Chechulin. Calculation of the security metrics for the monitoring of the current security state of information and telecommunication systems for the deision support of the responses on the security incidents. Federal Service for Intellectual Property. Certificate No 2014661026. Registered in the Computer Program Registry 22.10.2014.

Top 

Projects

Current Grants and Projects

  • Igor Kotenko (Principal Investigator). Grant of Russian Science Foundation 21-71-20078 " Analytical processing of large arrays of heterogeneous data in the interests of state assessment, decision support and incident investigation to ensure cybersecurity of critical infrastructures", 2021-2024 (Researcher).
    RSCF_21-71-20078_Report_2021_eng.pdf [application/pdf] (303137 bytes)
    RSCF_21-71-20078_Report_2021_rus.pdf [application/pdf] (404167 bytes)

Former Projects

  • Elena Doynikova (Principal Investigator). Techniques of security assessment and response to cyber attacks in the industrial Internet of Things based on the ontology of security metrics and methods of intellectual analysis of big data. Research grant # 19-07-01246 A of Russian Foundation of Basic Research, 2019-2021 (Principal Investigator).
    Report-2019-19-07-01246-a-short.pdf [application/pdf] (215676 bytes)
    Report-2020-19-07-01246-a-short.pdf [application/pdf] (203097 bytes)
    Report-2021-19-07-01246-a-short.pdf [application/pdf ] (400195 bytes)
  • Vasiliy Desnitsky (Principal Investigator). Models, techniques and algorithms for security analysis of software and hardware components of wireless sensor networks. Research grant # 19-07-00953 A of Russian Foundation of Basic Research, 2019-2021 (Researcher).
    Report-2019-19-07-00953-a-short.pdf [application/pdf] (195496 bytes)
    Report-2020-19-07-00953-a-short.pdf [application/pdf] (201695 bytes)
    Report-2021-19-07-00953-a-short.pdf [application/pdf ] (205488 bytes)
  • Igor Kotenko (Principal Investigator) State Contract No. 05.607.21.0322 "Development of methods, models, algorithms and software tools based on detecting deviations in heuristics of ultra-high volume traffic to detect network attacks and protect against them". Project of Russian Ministry of Education and Science in scope of the Program "Research and development in priority directions of evolution of the scientific and technological complex of Russia on 2014-2020", 2019-2020 (Researcher).
    Report-FTP-Results-05.607.21.0322.pdf [application/pdf] (204912 bytes)
  • Andrey Chechulin (Principal Investigator). Grant of Russian Science Foundation 18-71-10094 "Monitoring and counteraction to malicious influence in the information space of social networks", 2018-2021 (Researcher).
    RSCF_18-71-10094_Report_2020_eng.pdf [application/pdf] (196723 bytes)
    RSCF_18-71-10094_Report_2020_rus.pdf [application/pdf] (258925 bytes)
    RSCF_18-71-10094_Report_2021_eng.pdf [application/pdf] (178723 bytes)
    RSCF_18-71-10094_Report_2021_rus.pdf [application/pdf] (194835 bytes)
  • Igor Kotenko (Principal Investigator). "Monitoring and identification of destructive information impacts and negative personal tendencies of the younger generation when interacting with the Internet space on the basis of methods of neurocomputer and neural network processing of Internet content" Research grant # 18-29-22034 of Russian Foundation of Basic Research, 2018-2021 (Lead researcher).
    Report-2019-18-29-22034-short.pdf [application/pdf] (147123 bytes)
    Report-2020-18-29-22034-short.pdf [application/pdf] (356989 bytes)
  • Igor Saenko (Principal Investigator). Grant of Russian Science Foundation 18-11-00302 "Intelligent digital network content processing for effective detection and counteraction of inappropriate, dubious and harmful information", 2018-2020 (Researcher).
    RSF-Results-2018-18-11-00302-Eng.pdf [application/pdf] (94208 bytes)
    RSF-Results-2018-18-11-00302-Rus.pdf [application/pdf] (245760 bytes)
  • Andrey Chechulin (Principal Investigator). "Research, development and application of Augmented Reality technology for cyber and cyberphysical systems security data visualization" Research grant # 18-37-20047 of Russian Foundation of Basic Research, 2018-2020 (Researcher).
    Report-2019-18-37-20047-short.pdf [application/pdf] (208896 bytes)
  • Igor Kotenko (Principal Investigator). NIR-FUND of ITMO University 717075 "Methods, Models, Methods, Algorithms, Protocols and Applications for ensuring Information Security of Cyber-Physical Systems", 2017-2019 (Researcher).
  • Andrey Chechulin (Principal Investigator). President's of Russian Federation Grant MK-314.2017.9 "Methods, models and algorithms for the construction and usage of a hybrid data warehouse for analytical processing of the information and security events", 2017-2018 (Researcher).
  • Elena Doynikova (Principal Investigator). Development of models, techniques and alghoritms for automated countermeasures generation in process of security information and events management. Research grant # 16-37-00338-mol_a of Russian Foundation of Basic Research, 2016-2017 (Principal Investigator).
    Report-2016-16-37-00338-mol-a-short.pdf [application/pdf] (308434 bytes)
    Report-2017-16-37-00338-mol-a-short.pdf [application/pdf] (139264 bytes)
  • Igor Kotenko (Principal Investigator) Grant of Russian Science Foundation 15-11-30029 "Incident management and counteraction against targeted cyber-physical attacks in distributed largescaled mission critical systems taking into account cloud services and networks of the Internet of Things", 2015-2017., 2015-2017 (Researcher).
    RSF-Results-2015-15-11-30029-Eng.pdf [application/pdf] (18843 bytes)
    RSF-Results-2015-15-11-30029-Rus.pdf [application/pdf] (128851 bytes)
    RSF-Results-2016-15-11-30029-Eng.pdf [application/pdf] (327680 bytes)
    RSF-Results-2016-15-11-30029-Rus.pdf [application/pdf] (442368 bytes)
    RSF-Results-2017-15-11-30029-Eng.pdf [application/pdf] (327680 bytes)
    RSF-Results-2017-15-11-30029-Rus.pdf [application/pdf] (438272 bytes)
  • Vasiliy Desnitsky (Principal Investigator). Development and investigation of models and techniques for design and verification of combined protection mechanisms for information and telecommunication systems with embedded devices on the base of expert knowledge. Research grant # 14-07-00417-a of Russian Foundation of Basic Research, 2014-2016 (Researcher).
    Report-2014-14-07-00417-a-short.pdf [application/pdf] (258333 bytes)
    Report-2015-14-07-00417-a-short.pdf [application/pdf] (516620 bytes)
    Report-2016-14-07-00417-a-short.pdf [application/pdf] (740843 bytes)
  • Igor Saenko (Principal Investigator). Models and methods of access to resources in a unified information and communication space of heterogeneous systems based on artificial intelligence technology. Research grant # 14-07-00697-a of Russian Foundation of Basic Research, 2014-2016 (Researcher).
    Report-2014-14-07-00697-a-short.pdf [application/pdf] (303104 bytes)
    Report-2015-14-07-00697-a-short.pdf [application/pdf] (395000 bytes)
    Report-2016-14-07-00697-a-short.pdf [application/pdf] (614957 bytes)
  • Igor Kotenko (Principal Investigator) State Contract No. 14.604.21.0137 "Development of the technologies of the interactive visualization of the unformalized heterogeneous data for decision support systems in scope of the information security monitoring and management in the information and telecommunication systems". Project of Russian Ministry of Education and Science in scope of the Program "Research and development in priority directions of evolution of the scientific and technological complex of Russia on 2014-2020", 2014-2016., 2014-2016 (Researcher).
    14.604.21.0137_current_status.pdf [application/pdf] (138103 bytes)
  • Igor Kotenko (Principal Investigator) State Contract No. 14.604.21.0147 "Development of the methods for aggregation, normalization, analysis and visualization of big arrays of the heterogeneous, structured, semi-structured and unstructured data for the security monitoring and management of the distributed network of the electronic consumer devices". Project of Russian Ministry of Education and Science in scope of the Program "Research and development in priority directions of evolution of the scientific and technological complex of Russia on 2014-2020", 2014-2016., 2014-2016 (Researcher).
    14.604.21.0147_current_status.pdf [application/pdf] (142791 bytes)
  • Igor Kotenko (Principal Investigator). State Contract No. 14.604.21.0033 Models, methods and software for development and analysis of information-telecommunication system security components for Internet of Things concept. Project of Russian Ministry of Education and Science in scope of the Program "Research and development in priority directions of evolution of the scientific and technological complex of Russia on 2014-2020", 2014-2015., 2014-2015 (Researcher).
    14.604.21.0033_current_status [application/pdf] (262992 bytes)
  • Igor Kotenko (Principal Investigator) State Contract No. 14.616.21.0028 "Perspective methods of correlation of the security information and incidents management information in the critical infrastructures on the base of the convergence of the technologies of the security awareness on the physical and logical levels". Project of Russian Ministry of Education and Science in scope of the Program "Research and development in priority directions of evolution of the scientific and technological complex of Russia on 2014-2020", 2014., 2014-2014 (Researcher).
  • Igor Kotenko (Principal Investigator). Mathematical models and methods for monitoring and management of information security in computer networks and systems of critical infrastructures based on intelligent services of information protection. Research grant # 13-01-00843-a of Russian Foundation of Basic Research, 2013-2015 (Researcher).
    Report-2013-13-01-00843-a-short.pdf [application/pdf] (294747 bytes)
    Report-2014-13-01-00843-a-short.pdf [application/pdf] (761856 bytes)
    Report-2015-13-01-00843-a-short.pdf [application/pdf] (562916 bytes)
  • Igor Kotenko (Principal Investigator). Methods for the synthesis of the distributed intelligent system of information and technological security of automated control systems for railways. Research grant # 13-07-13159-ofi_m_RJD of Russian Foundation of Basic Research, 2013-2014 (Researcher).
  • Igor Kotenko (Principal Investigator). Mathematical models, methods and algorithms of attack modeling, computer systems and networks protection analysis, information security risk analysis and decision-making for selection of security mechanisms in computer systems and networks. Program "Architectural and software solutions, and security of data-processing supercomputer complexes of new generations" of the Russian Academy of Sciences Branch "Nanotechnologies and Information Technologies", 2012-2014 (Researcher).
  • Igor Kotenko (Principal Investigator). State Contract No. 11.519.11.4008 Research and development of methods, models and algorithms of intellectualizing the secirity services in critical infrastructures. Project of Russian Ministry of Education and Science, 2011-2013 (Researcher).
  • Igor Kotenko (Principal Investigator). Mathematical models and methods of integrated protection against network attacks and malware in computer networks and systems based on hybrid multi-agent modeling and simulation of computer counteraction, verified adaptive security policies and proactive monitoring by data mining. Research grant # 10-01-00826-a of Russian Foundation of Basic Research, 2010-2013 (Researcher).
    Report-2010-10-01-00826-a-short.pdf [application/pdf] (191714 bytes)
    Report-2011-10-01-00826-a-short.pdf [application/pdf] (260794 bytes)
    Report-2012-10-01-00826-a-short.pdf [application/pdf] (348160 bytes)
  • Igor Kotenko (Principal Investigator from SPIIRAS). Design of Secure and energy-efficient embedded systems for Future internet applications (SecFutur). Research Project of the European Community seventh framework program (FP7). Contract No. 256668 (http://www.secfutur.eu/), 2010-2013 (Researcher).
  • Igor Kotenko (Principal Investigator from SPIIRAS). MAnagement of Security information and events in Service InFrastructures (MASSIF). Research Project of the European Community seventh framework program (FP7). Contract No. 257475 (http://www.massif-project.eu/), 2010-2013 (Researcher).
  • Igor Kotenko (Principal Investigator). Mathematical Models, Methods and Algorithms of Proactive Protection against Malware in Computer Networks and Systems. Program "Architecture, system solutions, software, standardization and information security of computer complexes of new generations" of the Russian Academy of Sciences Branch "Nanotechnologies and Information Technologies", 2009-2011 (Researcher).

Top 

Main publications

Books and Chapters in Books

  1. Elena Doynikova, Igor Kotenko. Assessment of security and choice of countermeasures for cybersecurity management // Moscow, 2021. monograph p. 184. eLibrary ID: 47416769
  2. Igor Kotenko, Igor Saenko, Andrey Chechulin, Olga Polubelova, Evgenia Novikova, Elena Doinikova, Andrey Shorov, Vasily Desnitsky. Intelligent information security services in critical infrastructures. Monography / Ed. Igor Kotenko and Igor Sayenko. St. Petersburg: BHV Publishing House, 2019. ISBN 978-5-9775-3968-5 https://www.elibrary.ru/item.asp?id=42927796 eLIBRARY ID: 42927796
  3. Igor Kotenko, Andrey Fedorchenko, Elena Doynikova. Data analytics for security management of complex heterogeneous systems: event correlation and security assessment tasks // Chapter in book Advances in Cyber Security Analytics. Shishir K. Shandilya (Ed.). Springer. 2019. (WoS and Scopus).
  4. Andrey Fedorchenko, Elena Doynikova, Igor Kotenko. Towards Intelligent Data Processing for Automated Determination of Information System Assets // Chapter in book Handbook of Research on Intelligent Data Processing and Information Security Systems. IGI Global. 2019. ISBN13: 9781799812906. ISBN10: 1799812901. EISBN13: 9781799812920. pp. 147-160. DOI: 10.4018/978-1-7998-1290-6.ch007. (Scopus)
  5. Igor Kotenko, Elena Doynikova, Andrey Chechulin, Andrey Fedorchenko. AI- and Metrics-Based Vulnerability-Centric Cyber Security Assessment and Countermeasure Selection: An Artificial Intelligence Approach //Chapter in book: Guide to Vulnerability Analysis for Computer Networks and Systems - An Artificial Intelligence Approach. S. Parkinson, A. Crampton, R. Hill (eds). Springer, Cham, 2018. P.101-130. DOI: https://doi.org/10.1007/978-3-319-92624-7_5. Print ISBN 978-3-319-92623-0. Online ISBN 978-3-319-92624-7 (WoS and Scopus).

Papers

2022

  1. Evgenia Novikova, Diana Gaifulina, Elena Doynikova, Igor Kotenko. Construction and Analysis of Integral User-Oriented Trustworthiness Metrics // Electronics 2022, 11(2), 234, 234. https://doi.org/10.3390/electronics11020234 https://www.mdpi.com/journal/electronics (WoS Q3, Scopus Q2, , ) file:///C:/Users/79291/Downloads/electronics-11-00234.pdf DOI: 10.3390/electronics11020234 eLIBRARY ID: 48142369
  2. M. Kuznetsov, Evgenia Novikova, Igor Kotenko, Elena Doynikova. Privacy policies of iot devices: collection and analysis // Sensors. 2022. . 22. 5, 1838 DOI: 10.3390/s22051838 eLIBRARY ID: 48183588
  3. Igor Kotenko, Igor Saenko, Igor Parashchuk, Elena Doynikova. An approach for selecting countermeasures against harmful information based on uncertainty management // Computer Science and Information Systems. 2022. . 19. 1. . 415-433. DOI: 10.2298/CSIS210211057K eLIBRARY ID: 48188266
  4. Roman Kryukov, Elena Doynikova, Igor Kotenko. Security analysis of information systems based on attack sequences generation and testing // Proceedings of 14th International Symposium on Intelligent Distributed Computing - IDC'2021. Sep 16-18, 2021, Online Conference, Italy. 2021. // Studies in Computational Intelligence. 2022. . 1026. . 427-437. DOI: 10.1007/978-3-030-96627-0_39 eLIBRARY ID: 48590774
  5. Evgenia Novikova, Elena Doynikova, S. Golubev S. Federated learning for intrusion detection in the critical infrastructures: vertically partitioned data use case // Algorithms. 2022. . 15. 4. : 104 DOI: 10.3390/a15040104 eLIBRARY ID: 48426412
  6. Elena Doynikova, Evgenia Novikova, Ivan Murenin, Maxim Kolomeec, Diana Gaifulina, Olga Tushkanova, Dmitry Levshun, Alexey Meleshko, Igor Kotenko. Security Measuring System for IoT Devices // Proceedings of the 4th International Workshop on Attacks and Defenses for Internet-of-Things (ADIoT 2021). LNCS, Vol. 13106, 2021 // Lecture Notes in Computer Science. 2022. . 13106 LNCS. . 256-275. DOI:10.1007/978-3-030-95484-0_16 eLIBRARY ID: 48184836
  7. Alexandr Branitsky, Yash Sharma, Igor Kotenko, Elena Fedorchenko, Andrey Krasov, Igor Ushakov. Determination of the mental state of users of the social network reddit based on machine learning methods // Information and control systems. 2022. No. 1 (116). pp. 8-18. DOI: 10.31799/1684-8853-2022-1-8-18 eLibrary ID: 48100847 (in Russian).
  8. Diana Gaifulina, Igor Kotenko, Elena Fedorchenko. Sentiment analysis of social network posts for destructive impacts detection // In the collection: Actual problems of infotelecommunications in science and education (APINO 2022). XI International Scientific-technical and scientific-methodical conference. St. Petersburg, 2022. pp. 324-328. eLIBRARY ID: 49522709 (in Russian).
  9. Sergei Verevkin, Elena Fedorchenko. Analysis of security data sources for modeling and evaluating cyber attacks // In the collection: Actual problems of infotelecommunications in science and education (APINO 2022). XI International Scientific-technical and scientific-methodical conference. St. Petersburg, 2022. pp. 249-251. eLIBRARY ID: 49522692 (in Russian).
  10. Vasily Desnitsky, Igor Kotenko, Igor Parashuk, Igor Saenko, Elena Fedorchenko, Andrey Chechulin. Data traffic monitoring device // Patent for invention 2768543 C1, 03/24/2022. Application no. 2021109631 dated 07.04.2021 eLibrary ID: 48376561 (in Russian).

2021

  1. Doynikova Elena, Novikova Evgenia, Gaifulina Diana, Kotenko Igor. Towards Attacker Attribution for Risk Analysis // 15th International Conference on Risks and Security of Internet and Systems. 14-18 September 2020, Surrey, UK // Lecture Notes in Computer Science (LNCS), Springer. 2020.Vol. 12528, pp. 347-353 // DOI:10.1007/978-3-030-68887-5_22 (WoS, Scopus) eLIBRARY ID: 46756437
  2. Lidia Vitkova, Aleksei Pronichev, Elena Doynikova, Igor Saenko. Selection of Countermeasures against Propagation of Harmful Information via Internet // IOP Conference Series: Materials Science and Engineering. . "International Scientific Conference of Communications, Information, Electronic and Energy Systems, CIEES 2020", 26th-29th November 2020, Borovets, Bulgaria 1032:012017// (WoS, Scopus) 2021. P. 012017. DOI:10.1088/1757-899X/1032/1/012017 eLIBRARY ID: 46802931
  3. Alexander Branitskiy, Elena Doynikova, Igor Kotenko. Technique for classifying the social network profiles according to the psychological scales based on machine learning methods // : Journal of Physics: Conference Series. 13. . "13th Multiconference on Control Problems, MCCP 2020" 2021. . 012121. DOI: 10.1088/1742-6596/1864/1/012121 eLIBRARY ID: 46868874
  4. Doynikova E., Fedorchenko A. Semantic model of an exploits source code for data protection in automation systems // III International conference on advanced technologies in aerospace, mechanical and automation engineering - MIST: AEROSPACE-III-2020; 9-th International workshop on mathematical models and their applications (IWMMA-2020) Krasnoyarsk, November 20-21, 2020 // IOP conference series: materials science and engineeringP.12074 DOI: 10.1088/1757-899X/1047/1/012074 (Scopus) eLIBRARY ID: 44745392 https://www.elibrary.ru/download/elibrary_44745392_43994119.pdf
  5. Elena Doynikova, Alexander Branitskiy, Igor Kotenko. Detection and Monitoring of the Destructive Impacts in the Social Networks using Machine Learning Methods // First International Conference on ICT for Health, Accessibility and Wellbeing pp 60-65 (IHAW 2021). Larnaca, Cyprus. November 8-10, 2021. Communications in Computer and Information Science, Springer. 2021 (WoS, Scopus, , ) https://link.springer.com/chapter/10.1007/978-3-030-94209-0_6?error=cookies_not_supported&code=b314f809-c46c-4a0a-ab90-0cac50a3423e
  6. Roman Ushakov, Elena Doynikova, Evgenia Novikova, Igor Kotenko. CPE and CVE based Technique for Software Security Risk Assessment // : Proceedings of the 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, IDAACS 2021. 22-25 September, 2021, Cracow, Poland. pp.353-356 (WoS, Scopus, , ) DOI:10.1109/IDAACS53288.2021.9660968 eLIBRARY ID: 48134070
  7. Roman Kryukov, Elena Doynikova, Igor Kotenko. Security analysis of information systems based on attack sequences generation and testing // Proceedings of 14th International Symposium on Intelligent Distributed Computing - IDC'2021. Sep 16-18, 2021, Online Conference, Italy. 2021 (WoS, Scopus, , )
  8. Elena Doynikova, Andrey Fedorchenko, Igor Kotenko, Eugenia Novikova. Methodology for assessing security based on the semantic model of metrics and data // Questions of cybersecurity. 2021. No. 1 (41). pp. 29-40. DOI: 10.21681/2311-3456-2021-1-29-40. eLIBRARY ID: 44833771 (in Russian).
  9. Elena Fedorchenko, Eugenia Novikova, Diana Gayfullina, Igor Kotenko. Attacker profiling based on the network traffic analysis // Control systems, communications and security. 2021. No. 6. pp. 76-89. DOI: 10.24412/2410-9916-2021-6-76-89 eLIBRARY ID: 47416445 (in Russian).
  10. Alexander Branitskiy, Igor Kotenko, Elena Fedorchenko. Methods of classifying communities in social networks using neural networks // In the collection: Actual problems of infotelecommunications in science and education (APINO 2021). collection of scientific articles: in 4 t .. St. Petersburg State University of Telecommunications named after Prof. M.A. Bonch-Bruevich. Saint Petersburg, 2021. pp. 100-103. eLIBRARY ID: 46275372 (in Russian).
  11. Alexander Branitsky, Elena Doynikova, Igor Kotenko. Application of neural network processing methods to identify potentially destructive information content in social networks // In the collection: Pedagogy and psychology in medicine: problems, innovations, achievements. proceedings of the I International Scientific Congress. Moscow, 2021. pp. 35-40. eLIBRARY ID: 47190313 (in Russian).
  12. I. Bystrov, Andrey Fedorchenko, Elena Fedorchenko. An architecture of security assessment and countermeasure selection system based on the semantic model of data and metrics // Actual problems of infotelecommunications in science and education. collection of scientific articles: in 4 volumes. St. Petersburg State University of Telecommunications named after Prof. M.A. Bonch-Bruevich. St. Petersburg, 2021. pp. 143-146. eLIBRARY ID: 46275381 (in Russian).
  13. Elena Doynikova (Fedorchenko), Andrey Fedorchenko, Igor Ushakov, Andrey Krasov, Eugenia Novikova. Decision support for responding to violations in control systems using graph models // International Scientific Conference on Management Problems in Technical Systems. 2021. Vol. 1. pp. 278-282. eLIBRARY ID: 46684227 (in Russian).
  14. Igor Paraschuk, Elena Fedorchenko. Analysis of the effectiveness of the information security management system of the industrial Internet of Things using methods of the theory of fuzzy sets // In the collection: Actual problems of infotelecommunications in science and education. collection of scientific articles: in 4 volumes. St. Petersburg State University of Telecommunications named after Prof. M.A. Bonch-Bruevich. Saint Petersburg, 2021. pp. 617-621. eLibrary ID: 46275479 (in Russian).
  15. A. Jha, D. Tokarev, Eugenia Novikova, Elena Fedorchenko. Feature selection for attacker attributionin industrial automation & control systems // International Scientific Conference on Management Problems in Technical Systems. 2021. Vol. 1. pp. 273-277. eLIBRARY ID: 46684226 (in Russian).
  16. A.A. Branitsky, Ya. Sharma, E.V. Fedorchenko. Applying machine learning methods for sentiment analysis of users of the social network Reddit // XII St. Petersburg Interregional Conference "Information Security of Russian Regions" (IBRD-2021). 2021. 1. pp. 69-70 http://www.spoisu.ru/files/ibrr/ibrr2021/ibrr2021_materials.pdf eLIBRARY ID: 48278073 (in Russian).
  17. E.V. Fedorchenko, I.B. Paraschuk. Approaches to eliminating the uncertainty of security input information in the tasks of analyzing the security of industrial Internet of Things systems // XII St. Petersburg Interregional Conference "Information Security of Russian Regions" (IBRD-2021). 2021. 1. pp. 100-102 http://www.spoisu.ru/files/ibrr/ibrr2021/ibrr2021_materials.pdf eLIBRARY ID: 48288971 (in Russian).
  18. E.V. Fedorchenko, A.V. Fedorchenko, E.S. Novikova, A.A. Branitsky, A.V. Meleshko, V.V. Puchkov. System for security assessment and counermeasure selection using semantic model of data and metrics // XII St. Petersburg Interregional Conference "Information Security of Russian Regions" (IBRD-2021). 2021. 1. pp. 102-103 http://www.spoisu.ru/files/ibrr/ibrr2021/ibrr2021_materials.pdf eLIBRARY ID: 48288960 (in Russian).
  19. E.V. Fedorchenko, E.S. Novikova, D.A. Gayfulina, I.V. Kotenko. Attacker profiling for security analysis and response to cyber incidents // In the collection: Actual problems of protection and security: Proceedings of the XXIV All-Russian Scientific and Practical Conference RARAN (March 31 - April 3, 2021). 2021. Volume 1. pp. 144-148 eLIBRARY ID: 48010763 (in Russian).

2020

  1. Branitskiy A., Doynikova E., Kotenko I., Krasilnikova N., Levshun D., Tishkov A., Vanchakova N. The Common Approach to Determination of the Destructive Information Impacts and Negative Personal Tendencies of Young Generation Using the Neural Network Methods for the Internet Content Processing // Proceedings of the 13th International Symposium on Intelligent Distributed Computing (IDC 2019), October 7-9, 2019, Saint-Petersburg, Russia. 2020. // Studies in Computational Intelligence. 2020. Vol. 868 P. 302-310. DOI: 10.1007/978-3-030-32258-8_36. (Scopus, WoS). eLIBRARY ID: 43208120
  2. Igor Parashchuk, Elena Donikova. The Architecture of Subsystem for Eliminating an Uncertainty in Assessment of Information Objects Semantic Content Based on the Methods of Incomplete, Inconsistent and Fuzzy Knowledge Processing // 13th International Symposium on Intelligent Distributed Computing (IDC 2019), October 7-9, 2019, Saint-Petersburg, Russia. 2020. // Studies in Computational Intelligence 2020 Vol. 868 pp. 294-301. https://doi.org/10.1007/978-3-030-32258-8_35. ISSN 1860-949X. (Scopus, WoS).
  3. Gustavo Gonzalez-Granadillo, Elena Doynikova, Joaquin Garcia-Alfaro, Igor Kotenko, Andrey Fedorchenko. Stateful RORI-based countermeasure selection using hypergraphs // Journal of Information Security and Applications. 2020. vol. 54. . 102562. . DOI: 10.1016/j.jisa.2020.102562 (WoS, Scopus) eLIBRARY ID:43306456
  4. Igor Kotenko, Andrey Fedorchenko, Elena Doynikova. Data Analytics for Security Management of Complex Heterogeneous Systems: Event Correlation and Security Assessment Tasks // Advances in Cyber Security Analytics and Decision Systems 2020. pp. 79-116. DOI: 10.1007/978-3-030-19353-9_5 (WoS, Scopus) https://link.springer.com/chapter/10.1007/978-3-030-19353-9_5
  5. Elena Doynikova, Evgenia Novikova, Igor Kotenko. Attacker Behaviour Forecasting Using Methods of Intelligent Data Analysis: A Comparative Review and Prospects // Advanced Topics in Systems Safety and Security // Information (Switzerland). 2020. . 11. 3. . 168. 2020. vol. 11. 3. . 168 pp. 1-19. https://doi.org/10.3390/info11030168 (WoS) file:///C:/Users/Admin/Downloads/information-11-00168.pdf eLIBRARY ID: 43306145
  6. Elena Doynikova, Andrey Fedorchenko, Igor Kotenko. A Semantic Model for Security Evaluation of Information Systems // Journal of Cyber Security and Mobility. 2020. vol. 9, . 2. pp. 301330. DOI: 10.13052/JCSM2245-1439.925 (Scopus) eLIBRARY ID: 43302003
  7. Evgenia Novikova, Elena Doynikova, Igor Kotenko. P2Onto: Making Privacy Policies Transparent // The 3rd International Workshop on Attacks and Defenses for Internet-of-Things (ADIoT 2020), In Conjunction with ESORICS 2020. 4-6 November 2020, Paris, France. / Computer Security, Lecture Notes in Computer Science (LNCS), Springer. 2020. vol. 12501 LNCS. pp. 235-252. DOI: https://doi.org/10.1007/978-3-030-64330-0_15 (WoS, Scopus) eLIBRARY ID: 45049659
  8. Valery Andreev, Valery Ostrovskii, Timur Karimov, Aleksandra Tutueva, Elena Doynikova, Denis Butusov. Synthesis and Analysis of the Fixed-Point HodgkinHuxley Neuron Model // Electronics (Switzerland) Vol. 9. 3 . 434 DOI: 10.3390/electronics9030434 (WoS, Scopus) eLIBRARY ID: 43270554
  9. Dmitry Kaplun, Sergey Aryashev, Alexander Veligosha, Elena Doynikova, Pavel Lyakhov, Denis Butusov. Improving Calculation Accuracy of Digital Filters Based on Finite Field Algebra // Applied Sciences (Switzerland) 2020. vol. 10, 1, pp. 45-58. DOI: 10.3390/app10010045 (WoS, Scopus) eLIBRARY ID: 43252534
  10. Doynikova E V, Fedorchenko A V, Kryukov R. O. Determination of features of cyber-attack goals based on analysis of data in open security data sources // II International Science Conference "Advanced Technologies in Aerospace, Mechanical and Automation Engineering" Krasnoyarsk, 1821 November 2019 // IOP Conference Series: Materials Science and Engineering. 2020. pp. 012160. DOI: 10.1088/1757-899X/734/1/012160 (WoS, Scopus) eLIBRARY ID: 42766659
  11. Kotenko Igor, Branitskiy Alexander, Tishkov Artem, Doynikova Elena. Analysis of Formats of Young Peoples Communicative Behavior in Social Network // Proceedings - 2020 24th International Conference on System Theory, Control and Computing (ICSTCC), IEEE. 8-10 October 2020. pp. 439-444 (Scopus) DOI:10.1109/ICSTCC50638.2020.9259747 eLIBRARY ID: 45065233
  12. Parashchuk Igor, Doynikova Elena, Saenko Igor, Kotenko Igor. Selection of Countermeasures against Harmful Information based on the Assessment of Semantic Content of Information Objects in the Conditions of Uncertainty // 2020 International Conference on INnovations in Intelligent SysTems and Applications INISTA 2020. Novi Sad, August 24-26 2020 P. 9194680 DOI: 10.1109/INISTA49547.2020.9194680 (Scopus) eLIBRARY ID: 45285751
  13. Doynikova E., Kotenko I., Parashchuk I. An alternative of classification for network traffic monitoring procedures in order to detect harmful information and computer attacks // The 1st International Conference on Computer Technology Innovations dedicated to the 100th anniversary of the Gorky House of Scientists of Russian Academy of Science (ICCTI 2020). Saint Petersburg, Russia. April 13-14. SPb.: Petropolis. 144 p. P.8-12. ISBN: 978-5-9676-1216-9. (Scopus) https://iccti.kp.center/wp-content/uploads/2020/12/ICCTI2020-OCP-press.pdf
  14. Elena Doynikova, Andrey Fedorchenko, Igor Kotenko I. Determination of features of cyber attack goals based on analysis of data in open security data sources // IOP Conference Series: Materials Science and Engineering, II International Scientific conference MIST: Aerospace-2019, Krasnoyarsk, November 18-21, 2019 . 12160. eLIBRARY ID: 42766659
  15. Branitskiy Alexander, Doynikova Elena, Kotenko Igor. Use of neural networks for forecasting of the exposure of social network users to destructive impacts // Information and Control Systems 2020. 1(104) pp. 24-33. DOI: 10.31799/1684-8853-2020-1-24-33 (Scopus, , ) (in Russian).
  16. Dmitry Levshun, Anton Tishkov, Elena Doynikova. Annotation of social network posts and profiles in order to detect destructive impacts // IV Interregional Scientific-Practical Conference "Advanced National Information Systems and Technologies". September 22-26, 2020. Materials of the conference. P. 205-206. eLIBRARY ID: 45844814 http://www.spoisu.ru/files/pnroit/pnroit-2020_materials.pdf (in Russian).
  17. A. A. Branitsky, E. V. Doynikova, I. V. Kotenko Technique of classification of social network users by the psychological scales of the Ammon test based on artificial neural networks // Materials of the conference "Information Technologies in Management". 2020. P. 266-268 eLIBRARY ID: 44686237 (in Russian).
  18. A. A. Branitsky, E. Doynikova, Igor V. Kotenko Technique for determination of social network users exposure to destructiveness // IX international scientific-technical and scientific-methodical conference "Actual problems of infotelecommunication in science and education" (APINO-2020)". February 26-27, 2020. Collection of scientific articles. 2020. Vol. 1. . 159-162. eLIBRARY ID: 44603986 (in Russian).
  19. E. V. Doynikova, O. S. Dudkina, I. B. Saenko Decisions support to increase protection against information security incidents using MITRE ATT&CK database // IX International scientific-technical and scientific-methodological conference "Actual problems of infotelecommunications in science and education" (APINO-2020)". February 26-27, 2020. Collection of scientific articles. 2020. Vol. 1. P. 409-414. eLIBRARY ID: 44604037 (in Russian).
  20. E. V. Doynikova, E. S. Novikova Forecasting attacker behavior using intelligent data analysis // IX International scientific-technical and scientific-methodological conference " Actual problems of infotelecommunications in science and education "(APINO-2020)". February 26-27, 2020. Collection of scientific articles. 2020. Vol. 1. P. 415-418. eLIBRARY ID: 44604038 (in Russian).
  21. E. V. Doynikova, A. N. Polubaryeva Analysis of the problems, their possible solutions and existing prospects of information security issues of wireless medical devices // IX International Scientific-technical and scientific-methodological Conference " Actual problems of infotelecommunications in science and education "(APINO-2020)". February 26-27, 2020. Collection of scientific articles. 2020. Volume 1. pp. 419-424. eLIBRARY ID: 44604039 (in Russian).
  22. L. A. Vitkova, E. V. Doynikova, A. P. Pronichev About modeling the processes of detecting and countering terrorist and extremist activity on the internet and social networks // XVII St. Petersburg International Conference " Regional Informatics (RI-2020)". St. Petersburg, October 28-30, 2020, part 1., pp. 126-127 eLIBRARY ID: 46533860 http://www.spoisu.ru/files/ri/ri2020/ri2020_materials_1.pdf (in Russian).
  23. E. V. Doynikova, A.V. Fedorchenko, D. A. Gaifulina Technique for selection of countermeasures against cyber attacks based on the ontology of security metrics // XVII St. Petersburg International Conference " Regional Informatics (RI-2020)". St. Petersburg, October 28-30, 2020, part 1., pp. 137-138 eLIBRARY ID: 46542004 http://www.spoisu.ru/files/ri/ri2020/ri2020_materials_1.pdf (in Russian).
  24. A.V. Kartel, E. S. Novikova, I. N. Murenin, E. V. Doynikova Defining attributes for malware authorship attributing based on control flow graph analysis // XVII St. Petersburg International Conference " Regional Informatics (RI-2020)". St. Petersburg, October 28-30, 2020, part 1., p. 139-141 eLIBRARY ID: 46541825 http://www.spoisu.ru/files/ri/ri2020/ri2020_materials_1.pdf (in Russian).
  25. A.V. Tishkov, A. A. Strakh, A. A. Branitsky, E. V. Doynikova, A. A. Chechulin Analysis of correlations between Ammons test scales for determination of features for test results forecasting // Perspective directions of development of domestic information technologies: materials of the VI interregional scientific and practical conference, Sevastopol, September 22-26, 2020, . 122-123. eLIBRARY ID: 45844771 http://www.spoisu.ru/files/pnroit/pnroit-2020_materials.pdf (in Russian).
  26. V. A. Desnitsky, A. A. Chechulin, E. V. Doynikova A technique for verification of representation models of wireless sensor networks // Perspective directions of development of domestic information technologies: materials of the VI interregional scientific and practical conference, Sevastopol, September 22-26, 2020, . 197-198. eLIBRARY ID: 45844808 http://www.spoisu.ru/files/pnroit/pnroit-2020_materials.pdf (in Russian).
  27. E. V. Doynikova, E. V. Chechulin, A.V. Meleshko Extended ontology of metrics for security assessment of industrial Internet of Things systems // Perspective directions of development of domestic information technologies: materials of the VI interregional scientific and practical conference, Sevastopol, September 22-26, 2020, . 201-202. eLIBRARY ID: 45844811 http://www.spoisu.ru/files/pnroit/pnroit-2020_materials.pdf (in Russian).
  28. A. A. Chechulin, E. V. Doynikov, V. A. Desnitsky Model of a stacked pie chart for visual analytics in virtual reality // Perspective directions of development of domestic information technologies: materials of the VI interregional scientific and practical conference, Sevastopol, September 22-26, 2020, pp. 233-234. eLIBRARY ID: 45844827 http://www.spoisu.ru/files/pnroit/pnroit-2020_materials.pdf (in Russian).
  29. L. A. Vitkova, I. B. Saenko, E. V. Doynikova, A. P. Pronichev Model for detecting and countering extremist activity on the Internet // Perspektivnye napravleniya razvitiya otechestvennykh informatsionnykh tekhnologii: materials of the VI interregional scientific and practical conference, Sevastopol, 22-26 Sep. 2020, pp. 71-72 eLIBRARY ID: 45844754 http://www.spoisu.ru/files/pnroit/pnroit-2020_materials.pdf (in Russian).
  30. D. N. Shevchenko, E. V. Doynikova Technique for analysis of internal information security incidents within the corporate data transfer framework // Perspective directions of development of domestic information technologies: materials of the VI interregional scientific and practical conference, Sevastopol, September 22-26, 2020, pp. 57-58 eLIBRARY ID: 45844748 http://www.spoisu.ru/files/pnroit/pnroit-2020_materials.pdf (in Russian).
  31. E. V. Doynikova, E. S. Novikova Response against cyberattacks considering attacker profile // Perspektivnye napravleniya razvitiya otechestvennykh informatsionnykh tekhnologii: materials of the VI interregional scientific and practical conference, Sevastopol, 22-26 Sep. 2020, pp. 203-204. eLIBRARY ID: 45844812 http://www.spoisu.ru/files/pnroit/pnroit-2020_materials.pdf (in Russian).
  32. E. V. Doynikova, N. A. Krivykh Tool of monitoring and integration of vulnerabilities from open databases// Perspektivnye napravleniya razvitiya otechestvennykh informatsionnykh tekhnologii: materials of the VI interregional scientific and practical conference, Sevastopol, 22-26 Sep. 2020, pp. 231-232. http://www.spoisu.ru/files/pnroit/pnroit-2020_materials.pdf eLIBRARY ID: 45844826 (in Russian).
  33. Tishkov A.V., Strakh L. V., Doynikova E. V. Characteristic of relationship of I-functions in the personality structure of junior-course students of Medical University // Materials of the conference "Information Technologies in management" (ITU-2020). St. Petersburg: JSC "Concern" Central Research Institute "Electropribor". 2020. pp. 259-261 eLIBRARY ID: 44686235 (in Russian).
  34. E. V. Doynikova, A.V. Fedorchenko An approach to building an ontology of metrics for dynamic security analysis // Materials of the 29th Scientific and Technical Conference "Methods and technical means of ensuring information security". 2020. 29, . 42-43. eLIBRARY ID: 44017261 (in Russian).
  35. E. V. Doynikova, A. V. Meleshko, A. V. Fedorchenko, YM. opchak System for selecting protection measures against ddos attacks // Proceedings of the 29th scientific and technical conference "Methods and technical tools of information security". 2020. 29, . 66-68. eLIBRARY ID: 44017275 (in Russian).
  36. A. A. Bogatyrev, A. A. Branitsky, N. P. Vanchakova, E. V. Doynikova, I. V. Kotenko, N. V. Krasilnikova, D. S. Levshun, A.V. Tishkov Methods of identifying and preventing destructive formats of communicative behavior of young people in social networks // Proceedings of the conference "Neuroinformatics-2020". P. 388-397 eLIBRARY ID: 46415288 (in Russian).
  37. E. V. Fedorchenko Analysis of the exploits source code to improve efficiency of the security information and event management systems // Proceedings of the International Conference "Innovations in Information Technologies, Mechanical Engineering and Motor Transport" (IITMA-2020). Russia, Kemerovo. December 4, 2020. . 201-203 eLIBRARY ID: 44730138 (in Russian).

2019

  1. Andrey Fedorchenko, Elena Doynikova, Igor Kotenko. Determination of System Weaknesses based on the Analysis of Vulnerability Indexes and the Source Code of Exploits // Journal of Universal Computer Science. 2019, Vol. 25, No. 9. pp. 1043-1065. http://www.jucs.org/jucs_25_9/ determination_of_system_ weaknesses. (WoS, Scopus, SJR=0.33, Q2). eLIBRARY ID: 45166166
  2. Alexander Branitskiy, Dmitry Levshun, Natalia Krasilnikova, Elena Doynikova, Igor Kotenko, Artem Tishkov, Nina Vanchakova, and Andrey Chechulin. Determination of Young Generations Sensitivity to the Destructive Stimuli based on the Information in Social Networks // Journal of Internet Services and Information Security (JISIS), Vol. 9, No. 3, August 2019. P. 1-20. DOI: 10.22667/JISIS.2019.08.31.001. URL: http://isyou.info/jisis/vol9/no3/jisis-2019-vol9-no3-01.pdf. (Scopus, WoS, SJR=0.18, Q4). eLIBRARY ID: 41700137
  3. Elena Doynikova, Andrey Fedorchenko, Igor Kotenko. Detection of Weaknesses in Information Systems for Automatic Selection of Security Actions // Automatic Control and Computer Sciences, Springer. 2019. vol. 53. iss. 8. .1029-1037 (WoS, Scopus, SJR=0.23, Q3). eLIBRARY ID: 43268189
  4. Elena Doynikova, Andrey Fedorchenko, Igor Kotenko. Automated Revealing of Organizational Assets based on Event Correlation // Proceedings of the 2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS), Canary Islands, 24-26 June 2019. . 8763843. DOI: 10.1109/NTMS.2019.8763843 (Scopus). eLIBRARY ID: 41677256
  5. Elena Doynikova, Andrey Fedorchenko, Igor Kotenko. Ontology of metrics for cyber security assessment //ACM INTERNATIONAL CONFERENCE PROCEEDING SERIES. Proceedings of the 14th International Conference on Availability, Reliability and Security, ARES 2019. Canterbury, 26-29 August 2019. . 3341496 https://doi.org/10.1145/3339252.3341496. ACM ISBN 978-1-4503-7164-3/19/08. (Scopus, WoS). eLIBRARY ID: 41627655
  6. Andrey Fedorchenko, Elena Doynikova, Igor Kotenko. Automated detection of assets and calculation of their criticality for the analysis of information system security // SPIIRAS Proceedings. 2019. vol. 18. no 5. pp. 1182-1211. DOI: 10.15622/sp.2019.18.5.1182-1211 (Scopus, SJR: 0.17, Q3). eLIBRARY ID: 40938369 (in Russian).
  7. Elena Doynikova, Diana Gaifulina, Roman Kryukov. Determination of attack goals features based on the open source security data analysis // Trends in the development of science and education, 2019. No. 56-2 P. 36-41 eLIBRARY ID: 43073434 DOI: 10.18411/lj-11-2019-33 (in Russian).
  8. Vasily Desnitsky, Elena Doinikova, Andrey Fedorchenko, Alexander Branitsky. Modeling and analysis of intruder actions in wireless sensor networks // Proceedings of the II International Scientific and Practical Conference "Digital Region: Experience, Competencies, Projects". Ed. Bryansk State Engineering and Technology University. P. 237-240. 2019. (in Russian).
  9. Alexander Branitskiy, Nina Vanchakova, Elena Doynikova, Igor Kotenko, Natalia Krasilnikova, Igor Saenko, Artem Tishkov. Common approach to the determination of destructive information impacts and negative personal trends of young generation using the techniques based on neural networks for internet content processing // 8th International Conference on Advanced Infotelecommunications (ICAIT 2019). February 27-28, 2019. Conference proceedings. Russia, St. Petersburg. vol. 1. pp. 164-167 eLIBRARY ID: 41383514 https://www.sut.ru/doci/nauka/1AEA/APINO/8-APINO%202019.%20.1.pdf (in Russian).
  10. Alexander Branitskiy, Lidia Vitkova, Igor Saenko, Andrey Chechulin, Elena Doynikova, Igor Kotenko, Artem Tishkov, Nina Vanchakova. Appying neural networks for predicting the results of the Ammon's test using the profile of social networks // XI St. Petersburg Interregional Conference Information Security of Russian Regions (ISRR-2019), October 23-25, 2019, Russia, St. Petersburg. 2019. pp.100-101. eLIBRARY ID: 45839427 http://www.spoisu.ru/files/ibrr/ibrr2019/ibrr2019_materials.pdf (in Russian).
  11. Elena Doynikova, Igor Parashchuk. Requirements to processes and components of elimination of uncertainty of the analysis of semantic filling of information objects for the benefit of detection and counteraction of harmful information // VIII International scientific-technical and scientific-methodological Conference "Actual problems of infotelecommunications in science and education" (APINO 2019). St. Petersburg, February 27-28, 2019 (collection of scientific articles) Vol.2, . 254-259 eLIBRARY ID: 42505015 https://www.sut.ru/doci/nauka/1AEA/APINO/8-APINO%202019.%20.2.pdf (in Russian).
  12. Elena Doynikova. Model for Forecasting Cyberattack Goals Based on the Neuro-Fuzzy Networks // VIII International scientific-technical and scientific-methodological Conference "Actual problems of infotelecommunications in science and education" (APINO 2019). St. Petersburg, February 27-28, 2019 (collection of scientific articles) Vol. 1. pp. 405-408. eLIBRARY ID: 41383563 https://www.sut.ru/doci/nauka/1AEA/APINO/8-APINO%202019.%20.1.pdf (in Russian).
  13. Lidia Vitkova, Elena Doynikova, Igor Kotenko. Model of Responses Against Unwanted, Questionable and Malicious Information on the Internet // VIII International scientific-technical and scientific-methodological Conference "Actual problems of infotelecommunications in science and education" (APINO 2019). St. Petersburg, February 27-28, 2019 (collection of scientific articles) Vol.1. pp. 223-227. eLIBRARY ID: 41383527 https://www.sut.ru/doci/nauka/1AEA/APINO/8-APINO%202019.%20.1.pdf (in Russian).
  14. Lidia Vitkova, Timur Gamidov, Elena Doynikova, Olga Dudkina, Alexey Kushnerevich. The Analysis of Features of the Industrial Internet of Things for Formation of a System of Security Metrics // VIII International scientific-technical and scientific-methodological Conference "Actual problems of infotelecommunications in science and education" (APINO 2019). St. Petersburg, February 27-28, 2019 (collection of scientific articles) Vol.1. pp. 212-217. eLIBRARY ID: 41383525 https://www.sut.ru/doci/nauka/1AEA/APINO/8-APINO%202019.%20.1.pdf (in Russian).
  15. Elena Doynikova. The technique and algorithms for the cyber attack forecasting based on neuro-fuzzy networks // The V interregional scientific and practical conference "Perspective directions of development of domestic information technologies". September 24-28, 2019, Russia, Sevastopol. pp. 308-310. eLIBRARY ID: 42944621 (in Russian).
  16. Elena Doynikova, Andrey Fedorchenko. Classification of interfaces and types of events used in the industrial internet of things for analysis of their weakness to cyberatacs // The V interregional scientific and practical conference "Perspective directions of development of domestic information technologies". September 24-28, 2019, Russia, Sevastopol. pp. 306-308. eLIBRARY ID: 42944620 (in Russian).
  17. Natalia Krasilnikova, Elena Doynikova, Nina Vanchakova. The seven level scale of destructive manifestations of behavior in social networks for monitoring destructive effects by neural network methods // The V interregional scientific and practical conference "Perspective directions of development of domestic information technologies". September 24-28, 2019, Russia, Sevastopol. pp. 304-306. eLIBRARY ID: 42944619 (in Russian).
  18. Alexander Branitskiy, Elena Doynikova, Veronika Kuzmina, Igor Saenko, Andrey Chechulin. Analysis of CVSS Metrics System in Order to Develop Attack Graph Algorithm // VIII International scientific-technical and scientific-methodological Conference "Actual problems of infotelecommunications in science and education" (APINO 2019). St. Petersburg, February 27-28, 2019 (collection of scientific articles) Vol. 1. pp. 167-172. eLIBRARY ID: 41383515 https://www.sut.ru/doci/nauka/1AEA/APINO/8-APINO%202019.%20.1.pdf (in Russian).
  19. Elena Doynikova. Classification and analysis of cyber attacks goals in the industrial internet of things // XI St. Petersburg Interregional Conference Information Security of Russian Regions (ISRR-2019), October 23-25, 2019, Russia, St. Petersburg. 2019. pp. 116-117 eLIBRARY ID: 45841665 http://www.spoisu.ru/files/ibrr/ibrr2019/ibrr2019_materials.pdf (in Russian).
  20. Olga Dudkina, Elena Doynikova, Igor Saenko. Analysis of information security metrics for the industrial internet of things // Regional informatics and information security. Proceedings. Issue 7. 2019. pp. 38-41. eLIBRARY ID: 42561902 http://www.spoisu.ru/files/riib/riib_7_2019.pdf (in Russian).
  21. Doynikova E. V., Vitkova L. A. Technique and algorithms for selection of measures to counter unwanted, doubtful and harmful information on the Internet // Regional Informatics and Information Security. Collection of works. Issue 7. 2019. pp. 246-248. eLIBRARY ID: 42562055 http://www.spoisu.ru/files/riib/riib_7_2019.pdf (in Russian).

2018

  1. Elena Doynikova, Igor Kotenko. An automated graph based approach to risk assessment for computer networks with mobile components // Communications in Computer and Information Science (. ) // Mobile Internet Security. The 2016 International Symposium on Mobile Internet Security, MobiSec 2016. Taichung, Taiwan, July 14-15, 2016. Vol. 797 . 95-106 eLIBRARY ID: 35502078 DOI: 10.1007/978-981-10-7850-7_9
  2. Igor Kotenko, Andrey Fedorchenko, Elena Doynikova, Andrey Chechulin. An Ontology-based Hybrid Storage of Security Information // Information Technology and Control, No.4, 2018. P.655-667. (Q3, WoS). eLIBRARY ID: 37282133 DOI: 10.5755/j01.itc.47.4.20007
  3. Gustavo Gonzalez-Granadillo, Joaquin Garcia-Alfaro, Igor Kotenko, Elena Doynikova. Hypergraph-driven Mitigation of Cyber-Attacks // Internet Technology Letters. John Wiley & Sons, Ltd., 2018. Volume1, Issue1, May/June 2018. 6 p. https://doi.org/10.1002/itl2.38 (WoS).
  4. Igor Kotenko, Elena Doynikova. Selection of countermeasures against network attacks based on dynamical calculation of security metrics // Journal of Defence Modeling and Simulation, 2018. Vol. 15. 2. P.181-204. DOI: 10.1177/1548512917690278. https://doi.org/10.1177/1548512917690278 eLIBRARY ID: 35489635
  5. Doynikova E., Kotenko I. Approach for determination of cyber-attack goals based on the ontology of security metrics // 9th International Multidisciplinary Scientific and Research Conference on Modern Issues in Science and Technology Workshop in Advanced Technologies in Aerospace, Mechanical and Automation Engineering, MISTAerospace 2018, 20 October 2018 - 28 October 2018, Krasnoyarsk, Russia, IOP Conference Series: Materials Science and Engineering (MSE), IOP Publishing, Vol.450. - 2018. - 7 p. - https://doi.org/10.1088/1757-899X/450/5/052006. DOI: 10.1088/1757-899X/450/5/052006
  6. Elena Doynikova Igor Kotenko. The multi-layer graph based technique for proactive automatic response against cyber attacks // Proceedings of the 26th Euromicro International Conference on Parallel, Distributed and network-based Processing (PDP 2018). Cambridge, UK, March 21-23, 2018. Los Alamitos, California. IEEE Computer Society. 2018. P.470-477. DOI: 10.1109/PDP2018.2018.00081 (WoS and Scopus). eLIBRARY ID: 35728921
  7. Elena Doynikova, Igor Kotenko. An automated graph based approach to risk assessment for computer networks with mobile components // Mobile Internet Security. The 2016 International Symposium on Mobile Internet Security, MobiSec 2016. Taichung, Taiwan, July 14-15, 2016. Revised Selected papers. Communications in Computer and Information Science, V.797, Springer, 2018. P.95106. https://doi.org/10.1007/978-981-10-7850-7_9 (WoS and Scopus).
  8. Gustavo Gonzalez-Granadillo, Elena Doynikova, Igor Kotenko, Joaquin Garcia-Alfaro. Attack Graph-based Countermeasure Selection using a Stateful Return on Investment Metric // Lecture Notes in Computer Science (. ) // The 10th International Symposium on Foundations & Practice of Security (FPS 2017). October 23-24-25, 2017 Nancy, France. Vol. 10723 LNCS, P.293302. (WoS and Scopus) eLIBRARY ID: 35490864 DOI: 10.1007/978-3-319-75650-9_19
  9. Elena Doynikova, Andrey Fedorchenko, Igor Kotenko. Determination of security threat classes on the basis of vulnerability analysis for automated countermeasure selection // ACM International Conference Proceeding Series. 13. . "ARES 2018 - 13th International Conference on Availability, Reliability and Security" (ARES 2018). Hamburg, Germany, August 27-30, 2018 . 3233260 https://doi.org/10.1145/3230833.3233260 (WoS and Scopus) eLIBRARY ID: 38644965
  10. Elena Doynikova, Igor Kotenko. Approach for determination of cyber attack goals based on the ontology of security metrics // Proceedings of the International Workshop Advanced Technologies in Aerospace, Mechanical and Automation Engineering" (MIST: Aerospace-2018). October 20, 2018, Krasnoyarsk, Russia. IOP Conference Series: Materials Science and Engineering (MSE),IOP Publishing, Vol.450 5, . 052006-052013 https://doi.org/10.1088/1757-899X/450/5/052006.
  11. Elena Doynikova, Igor Kotenko. Improvement of attack graphs for cybersecurity monitoring: handling of inaccuracies, processing of cycles, mapping of incidents and automatic countermeasure selection // SPIIRAS Proceedings. 2018. 2(57) P. 211 -240. DOI: 10.15622/sp.57.9 (Scopus) eLIBRARY ID: 32761925 (in Russian).
  12. Maxim Kolomeec, Andrey Chechulin, Elena Doynikova, Igor Kotenko. A technique of visualization of cybersecurity metrics // Journal of Instrument Engineering. 2018. Vol.61.No.10.P.873-880. DOI: 10.17586/0021-3454-2018-61-10-873-880 eLIBRARY ID: 36408681 https://cyberleninka.ru/article/n/metodika-vizualizatsii-metrik-kiberbezopasnosti (in Russian).
  13. Elena Doynikova, Andrey Fedorchenko, Igor Kotenko. Determination of Information System Weaknesses for Automated selection of security measures // Problems of information security. Computer systems. 2018. No.3. P.89-99. ISSN 2071-8217 eLIBRARY ID: 36576822 (in Russian).
  14. Lidia Vitkova, Elena Doynikova. Decision support for protection against inappropriate information // Proceedings of the conference "Information technologies in management" (ITU-2018). St. Petersburg. October 2-4, 2018. SPb.: Concern Central Research Institute Electropribor JSC, 2018, P. 398-403. eLIBRARY ID: 37028985 (in Russian).
  15. Elena Doynikova, Andrey Fedorchenko. Application of ontological repository for analysis of security of information systems // Proceedings of the conference "Information technologies in management" (ITU-2018). St. Petersburg. October 2-4, 2018. SPb.: Concern Central Research Institute Electropribor JSC, 2018, P. 413-417. eLIBRARY ID: 37028989 (in Russian).
  16. Elena Doynikova. Approach to the cyberattack prediction and response based on the neuro-fuzzy networks in the industrial Internet of things // Proceedings of the conference "Information technologies in management" (ITU-2018). St. Petersburg. October 2-4, 2018. SPb.: Concern Central Research Institute Electropribor JSC, 2018, P.408-412. eLIBRARY ID: 37028987 (in Russian).
  17. Igor Parashchuk, Elena Doynikova, Igor Kotenko. Approach to the development of requirements for elimination of incomplete and contradiction of estimation and categorization of sense filling of information objects // XVI Anniversary Saint-Petersburg International Conference "Regional informatics-2018 (RI-2018)". St. Petersburg, Russia. October 24-26, 2018. Proceedings. P. 162-164. eLIBRARY ID: 36336097 http://www.spoisu.ru/files/ri/ri2018/ri2018_materials.pdf (in Russian).
  18. Elena Doynikova, Andrey Fedorchenko. Application of the ontological database in the task of vulnerability classification for automated determination of the security threats // XVI Anniversary Saint-Petersburg International Conference "Regional informatics-2018 (RI-2018)". St. Petersburg, Russia. October 24-26, 2018. Proceedings. P. 135-136. http://www.spoisu.ru/files/ri/ri2018/ri2018_materials.pdf eLIBRARY ID: 46484332 (in Russian).
  19. Elena Doynikova. Determination of the security input data for generation of the sample for neuro-fuzzy network training to forecast cyberattacks // XVI Anniversary Saint-Petersburg International Conference "Regional informatics-2018 (RI-2018)". St. Petersburg, Russia. October 24-26, 2018. Proceedings. P. 133-135. eLIBRARY ID: 46486377 http://www.spoisu.ru/files/ri/ri2018/ri2018_materials.pdf (in Russian).
  20. Elena Doynikova, Igor Kotenko. Techniques and tools of response to cyberattacks in the industrial Internet of Things // Actual problems of informational communication in science and education (PINO 2018). VII International technical science and methodical science conference. Compilation of papers. In 4 volumes. Edited by S.V. Bachevskiy. 2018. Volume 1. P. 23-28. eLIBRARY ID: 35231514 https://www.sut.ru/doci/nauka/7apino/Sb_APINO%202018__1.pdf (in Russian).
  21. Elena Doynikova, Sergey Savkov, Evgenii Chumak. Information security for the bodynets: main trends // Actual problems of informational communication in science and education (PINO 2018). VII International technical science and methodical science conference. Compilation of papers. In 4 volumes. Edited by S.V. Bachevskiy. 2018. Volume 1. P. 290-295. eLIBRARY ID: 35231577 https://www.sut.ru/doci/nauka/7apino/Sb_APINO%202018__1.pdf (in Russian).

2017

  1. Maxim Kolomeec, Gustavo Gonzalez-Granadillo, Elena Doynikova, Andrey Chechulin, Igor Kotenko, and Herve Debar. Choosing models for security metrics visualization // Computer Network Security. Lecture Notes in Computer Science, Springer-Verlag. The 2017 7th International Conference on Mathematical Methods, Models and Architectures for Computer Networks Security (MMM-ACNS-2017). August 28-30, 2017, Warsaw, Poland Vol.10446. P.7587. DOI: 10.1007/978-3-319-65127-9_7. (WoS and Scopus) eLIBRARY ID: 31066510
  2. Andrey Fedorchenko, Igor Kotenko, Elena Doynikova, Andrey Chechulin. The ontological approach application for construction of the hybrid security repository // XX International Conference on Soft Computing and Measurements (SCM'2017), Saint-Petersburg, May 24-26, 2017 P.525-528. DOI: 10.1109/SCM.2017.7970638 (WoS and Scopus). eLIBRARY ID: 31048917
  3. Igor Kotenko, Andrey Chechulin, Elena Doynikova, Andrey Fedorchenko. Ontological hybrid storage for security data // Studies in Computational Intelligence - 11th International Symposium on Intelligent Distributed Computing - IDC'2017, Belgrade, Serbia, 1113 October 2017, Vol, 737 P. 159-171. DOI: 10.1007/978-3-319-66379-1_15. (Scopus) eLIBRARY ID: 31065783 https://link.springer.com/chapter/10.1007/978-3-319-66379-1_15
  4. Elena Doynikova and Igor Kotenko. CVSS-based Probabilistic Risk Assessment for Cyber Situational Awareness and Countermeasure Selection // Proceedings of the 25th Euromicro International Conference on Parallel, Distributed and network-based Processing (PDP 2017). St. Petersburg, Russia, March 6-8, 2017. Los Alamitos, California. IEEE Computer Society. 2017. P.346-353 eLIBRARY ID: 31045380 DOI: 10.1109/PDP.2017.44
  5. Elena Doynikova, Andrey Chechulin, and Igor Kotenko. Analytical Attack Modeling and Security Assessment based on the Common Vulnerability Scoring System // Conference of Open Innovation Association, FRUCT. 20th Conference of Open Innovations Association FRUCT, LETI University, St.Petersburg, Russia,03-07 April 2017 P.53-61. eLIBRARY ID: 35517447 DOI: 10.23919/FRUCT.2017.8071292
  6. Elena Doynikova and Igor Kotenko. Enhancement of Probabilistic Attack Graphs for Accurate Cyber Security Monitoring // The 14th IEEE Conference on Advanced and Trusted Computing (ATC 2017). San Francisco, August 4-8, 2017, USA. Los Alamitos, California. IEEE Computer Society. 2017.P.1492-1497.
  7. Elena Doynikova and Igor Kotenko. A multi-layer technique for proactive response against cyber attacks based on graph models // Information Security. Inside, 2017, No. 6(78). pp. 58-67. eLIBRARY ID: 30585610 (in Russian).
  8. Elena Doynikova, Andrey Chechulin and Igor Kotenko. Computer network security evaluation based on CVSS metrics // Information and Control Systems, 2017, No. 6(91). pp. 76-87. eLIBRARY ID: 30794562 DOI: 10.15217/issn1684-8853.2017.6.76 (in Russian).
  9. Andrey Fedorchenko, Igor Kotenko, Elena Doynikova, Andrey Chechulin. The ontological approach application for the construction of the hybrid security repository. XX International Conference on Soft Computing and Measurements (SCM'2017), Proceedings. Saint-Petersburg, ETU "LETI", 2017. Vol. 2, P.55-58. eLIBRARY ID: 29902198 https://elibrary.ru/download/elibrary_29902198_57102181.pdf (in Russian).
  10. Andrey Fedorchenko, Elena Doynikova, and Andrey Chechulin. Analysis of the security data and their specifications for the security information and event management systems // VI International Conference on Advanced Info-Telecommunication (ICAIT 2017). March 1-2, 2017. Proceedings, Vol. 3. . 209-214 eLIBRARY ID: 32650671 https://www.sut.ru/doci/nauka/6apino/apino2017-3.pdf (in Russian).
  11. Elena Doynikova and Igor Kotenko. Technique for the automatic assessment of secondary business assets security properties criticality in the service oriented architectures // International congress IS&IT International Conference on Artificial Intelligence and Systems. Proceedings. Divnomorskoye, Russia. September 2-9, 2017. Vol. 2. pp. 349-355. (in Russian).
  12. Elena Doynikova and Igor Kotenko. Models, technique and algorithms of the countermeasure selection based on the system of security metrics for the proactive and reactive response to attacks in computer networks // X St. Petersburg Interregional Conference "Information Security of the regions of Russia" (IBRD-2017). November 1-3, 2017.Proceedings. Issue 4. St. Petersburg: SPOISU P. 223-225 eLIBRARY ID: 35276203 http://www.spoisu.ru/files/riib/riib_4_2017.pdf (in Russian).
  13. Andrey Fedorchenko, Andrey Chechulin, and Elena Doynikova. Security event formats in logging system of OS Windows // X St. Petersburg Interregional Conference "Information Security of the regions of Russia" (IBRD-2017). November 1-3, 2017.Proceedings. Issue 4. St. Petersburg: SPOISU P. 257-259. eLIBRARY ID: 35276215 http://www.spoisu.ru/files/riib/riib_4_2017.pdf (in Russian).
  14. Andrey Fedorchenko, Elena Doynikova, Igor Kotenko, and Andrey Chechulin. Analysis of security events properties for correlation process for siem-systems // The All-Russian Forum "The System of Distributed Situation Centers as the Basis for Digital Transformation of Public Administration" (SDSC-2017). 2017. . 199-201 (in Russian).
  15. Elena Doynikova, Igor Kotenko, and Andrey Fedorchenko. System of incident response for security information and events monitoring. The All-Russian Forum "The System of Distributed Situation Centers as the Basis for Digital Transformation of Public Administration" (SDSC-2017). 2017. . 148-150 (in Russian).
  16. Elena Doynikova, Andrey Fedorchenko, and Andrey Chechulin. Features of ontological approach application for the integration of security information. The All-Russian Forum "The System of Distributed Situation Centers as the Basis for Digital Transformation of Public Administration" (SDSC-2017). 2017. . 150-152 (in Russian).
  17. Andrey Chechulin, Elena Doynikova, and Andrey Fedorchenko. An approach for information security repository construction and application. The All-Russian Forum "The System of Distributed Situation Centers as the Basis for Digital Transformation of Public Administration" (SDSC-2017). 2017. . 209-211 (in Russian).

2016

  1. Elena Doynikova, Igor Kotenko. Countermeasure selection based on the attack and service dependency graphs for security incident management // 10th International Conference on Risks and Security of Internet and Systems : CRiSIS 2015. July 20-22, Mytilene, Lesvos Island, Greece / C. Lambrinoudakis and A. Gabillon (Eds.) // Lecture Notes in Computer Science (LNCS), Vol. 9572, Springer, 2016. P.107124. DOI: 10.1007/978-3-319-31811-0_7. http://link.springer.com/chapter/10.1007/978-3-319-31811-0_7 (WoS and Scopus) eLIBRARY ID: 27047170
  2. Igor Kotenko, Elena Doynikova. Dynamical calculation of security metrics for countermeasure selection in computer networks // 24th Euromicro International Conference on Parallel, Distributed, and Network-Based Processing (PDP 2016). Heraklion, Crete,2016 February 17-19. IEEE Computer Society DOI 10.1109/PDP.2016.96. P.558-565. (WoS and Scopus) eLIBRARY ID: 27160210
  3. Elena Doynikova, Igor Kotenko. Security assessment based on attack graphs and open standards for computer networks with mobile components // The 2016 International Symposium on Mobile Internet Security (MobiSec16). Taichung, Taiwan. July 14-15, 2016. 11 p. http://docs.wixstatic.com/ugd/a6c9b6_602321846ab246958450c7513f9c5692.pdf
  4. Elena Doynikova, Igor Kotenko. Techniques and software tool for risk assessment on the base of attack graphs in information and security event management systems // Information and Control Systems, 2016, 5(84), P.54-65. ISSN 1684-8853.2016. eLIBRARY ID: 27219304 DOI: 10.15217/issn1684-8853.2016.5.54 https://elibrary.ru/download/elibrary_27219304_64318826.pdf (in Russian).
  5. Elena Doynikova. Models, techniques and algorithms for calculation of the information systems security metrics in scope of the hierarchical system of the security metrics // Journal "Methods and technical means of ensuring information security" // 25th scientific and Technical conference "Methods and technical means of ensuring information security". July 4-July 7, 2016 St. Petersburg. Materials. Polytechnic University Press 25 P.45-47. eLIBRARY ID: 36546756 (in Russian).
  6. Elena Doynikova, Igor Kotenko. Technique for the security assessment of computer networks on the base of attack graphs and service dependency graphs. 9th Conference on Information Technologies in Control (ITC) . Proceedings. St.Petersburg, Russia. October 46, 2016. P.688-699. eLIBRARY ID: 27559699 (in Russian).
  7. Elena Doynikova, Igor Kotenko. Technique for countermeasure selection to response on security incidents in computer networks on the base of security metrics // 9th Conference on Information Technologies in Control (ITC) . Proceedings. St.Petersburg, Russia. October 46, 2016. P.700-705. eLIBRARY ID: 27559700 (in Russian).
  8. Elena Doynikova, Andrey Fedorchenko. Techniques of the automated response on the security incidents during information and security events management in the systems of interacting services // XXIX International Conference "Mathematical methods in technics and technology - -29", May 31 - June 3, 2016, St. Petersburg State Technological Institute, St.Petersburg, Russia. 10 (92). . 180-183. eLIBRARY ID: 28769331 (in Russian).
  9. Elena Doynikova, Igor Kotenko. Technique and software tool for the countermeasure selection in computer networks on the base of the dynamical recalculation of security metrics // International congress "IS&IT'16" - International Conference on Artificial Intelligence and Systems. Proceedings. Divnomorskoye, Russia. September 4-11. Taganrog, UFY, 2015. Vol. 2. P.271-276. (in Russian).
  10. Elena Doynikova. Graph-based and open standards-based security assessment for mobile networks // Anniversary XV St. Petersburg International Conference " Regional Informatics-2016 (RI-2016)" St. Petersburg, October 26-28, 2016. P.158-159. eLIBRARY ID: 35091302 http://www.spoisu.ru/files/ri/ri2016/ri2016_materials.pdf (in Russian).

2015

  1. Igor Kotenko, Elena Doynikova. Countermeasure selection in SIEM systems based on the integrated complex of security metrics // Proceedings of the 23th Euromicro International Conference on Parallel, Distributed and network-based Processing (PDP 2015). Turku, Finland. 4-6 March 2015. Los Alamitos, California. IEEE Computer Society. 2015. P.567-574. (WoS, Scopus)
  2. Igor Kotenko, Elena Doynikova. The CAPEC based generator of attack scenarios for network security evaluation // The IEEE 8th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS'2015). Proceedings. Warsaw, Poland, September 24-26, 2015. P.436-441. (WoS, Scopus)
  3. Elena Doynikova, Igor Kotenko, Andrey Chechulin. Dynamic Assessment of Computer Networks Security in SIEM Systems . Information Technology Security, 3, 2015. P.33-42. (in Russian).
  4. Igor Kotenko, Elena Doynikova. Methods of selecting countermeasures on the basis of an integrated system of indicators of security in systems of information management and security events // Information management systems, 3, 2015. P.60-69. DOI:10.15217/issn1684-8853.2015.3.60. (in Russian).
  5. Vasily Desnitsky, Elena Doynikova. Architecture and effectiveness evaluation of software tool for configuring security components of systems with embedded devices // Technical sciences from theory to practice, 47, 2015. P.9-13. (in Russian).
  6. Elena Doynikova, Vasily Desnitsky. Generator of the random attack sequences for the computer network on the base of the CAPEC attack patterns // Technical sciences from theory to practice, 46, 2015. P.11-16. (in Russian).
  7. Doynikova E. V., Kotenko I. V. Analysis and application of security metrics in the SIEM-systems on the base of attack graphs and dependency graphs services // Regional Informatics and information security proceedings. St. Petersburg Society of computer science, computer engineering, communication systems and management. 2015. C. 104-112. (in Russian).
  8. Elena Doynikova., Igor Kotenko. Analysis and application of the security metrics in the SIEM-systems on the base of the attack graphs and service dependencies // VIII Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2013)", Saint-Petersburg, October 23-25, 2015. The proceedings of conference, 2015.P.104-112 (in Russian).
  9. Elena Doynikova, Igor Kotenko. Countermeasure selection for the management of the computer networks security on the base of the integrated system of security metrics .24th All-Russian Conference Methods and technical tools of information security (MTTIS 2015). Proceedings. St.Petersburg, Russia. 29 June - 02 July, 2015. P.114-115. (in Russian).
  10. Elena Doynikova. Attacks generator on the base of the classification of the attack patterns CAPEC. 24th All-Russian Conference Methods and technical tools of information security (MTTIS 2015). Proceedings. St.Petersburg, Russia. 29 June - 02 July, 2015. P.71-72. (in Russian).
  11. Elena Doynikova. Application of dependency graphs of services within a task of analysis of computer network security for criticality assessment of system resources and reasonable choice of protective measures. IX Saint-Petersburg Interregional conference "Information security of regions of Russia (ISRR-2015)", Saint-Petersburg, October 28-30, 2015. The proceedings of conference, 2015. P.68-69. (in Russian).
  12. Elena Doynikova. Methods and algorithms development for generation of attack scenarios on the network for its security level evaluation. 20th St.Petersburg assembly of the young scientists and specialists. Proceedings.St.Petersburg, 2015. P.133. (in Russian).

2014

  1. Igor Kotenko, Elena Doynikova and Andrey Chechulin. Security metrics based on attack graphs for the Olympic Games scenario. 22th Euromicro International Conference on Parallel, Distributed, and Network-Based Processing (PDP 2014). Torino, Italy, February, 2014. 1066-6192/14 2014 IEEE DOI 10.1109/PDP.2014.113 IEEE Computer Society. 2014. P.561-568. (WoS, Scopus)
  2. Igor Kotenko, Elena Doynikova. Security Assessment of Computer Networks based on Attack Graphs and Security Events // The 2014 Asian Conference on Availability, Reliability and Security (AsiaARES 2014). In conjunction with ICT-EurAsia 2014. Bali, Indonesia, April 14th 17th, 2014. / Linawati et al. (Eds.): ICT-EurAsia 2014, Lecture Notes in Computer Science (LNCS), Vol.8407. IFIP International Federation for Information Processing (2014). Springer. 2014, P.462-471. (WoS, Scopus)
  3. Igor Kotenko, Elena Doynikova. Security Evaluation for Cyber Situational Awareness // The 2014 IEEE 6th International Symposium on Cyberspace Safety and Security (CSS 2014). August 20-22, 2014, Paris, France. 2014. Los Alamitos, California. IEEE Computer Society. 2014. P.1229-1236. (WoS, Scopus)
  4. Igor Kotenko, Elena Doynikova. Evaluation of Computer Network Security based on Attack Graphs and Security Event Processing // Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), Vol.5, No.3, September 2014. P.14-29. (Scopus)
  5. Igor Kotenko, Elena Doynikova. Calculation and analysis of the security metrics on the base of the attack graphs and service dependencies. Problems of information security. Computer systems, 2, 2014. P.19-36. (in Russian).
  6. Igor Kotenko, Elena Doynikova. Monitoring of the current security situation and security decisions support in the computer network on the base of the system of the security metrics . Journal of Instrument Engineering .57, 10, 2014. P.72-77. ISSN 0021-3454. (in Russian).
  7. Elena Doynikova. Security assessment in the information systems and information security incidents response considering current security situation. 7th Russian Multiconference on Problems in Control (MPC). Conference on Information Technologies in Control (ITC).Proceedings. St.Petersburg, Russia. October 79, 2014. P.601-604. ISBN 978-5-91995-042-4. (in Russian).
  8. Elena Doynikova. Calculation of the security metrics in the security monitoring and management systems // International science and practical conference "Theoretical and applied problems of the information security". June 19, 2014, Minsk, Police Academy, the Republic of Belarus, 2014. (in Russian).
  9. Vasily Desnitsky, Elena Doynikova. Development of the defence components for the embedded devices considering expert knowledge // International science and practical conference "Theoretical and applied problems of the information security". June 19, 2014, Minsk, Police Academy, the Republic of Belarus, 2014. (in Russian).
  10. Elena Doynikova. Approach to the security assessment on the base of the attack graphs in the security information and events management systems. 23th All-Russian Conference Methods and technical tools of information security (MTTIS 2014). Proceedings. St.Petersburg, Russia. 30 June - 03 July, 2014. P.90-91. (in Russian).
  11. Elena Doynikova, Igor Kotenko. Security assessment in the RR automated management systems // XIV Saint-Petersburg International Conference Regional informatics-2014 (RI-2014). Proceedings. St. Petersburg, 2014 . P.132-133. (in Russian).
  12. Elena Doynikova. Decision support for the countermeasures selection in the information systems on the base of the complex of the security metrics // XIV Saint-Petersburg International Conference Regional informatics-2014 (RI-2014). Proceedings. St. Petersburg, 2014. P.132. (in Russian).

2013

  1. Igor Kotenko, Igor Saenko, Olga Polubelova and Elena Doynikova. The Ontology of Metrics for Security Evaluation and Decision Support in SIEM Systems. The 2nd International Workshop on Recent Advances in Security Information and Event Management (RaSIEM 2013). In conjunction with the 8th International Conference on Availability, Reliability and Security (ARES 2013). September 2nd 6th, 2013. Regensburg, Germany. IEEE Computer Society. 2013. P.638-645. (Scopus)
  2. Igor Kotenko, Elena Doynikova. Security metrics for risk assessment of distributed information systems. The IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS'2013). Proceedings. Berlin, Germany, September 12-14, 2013. P.646-650. (Scopus)
  3. Igor Kotenko, Elena Doynikova, Andrey Chechulin. Dynamical recalculation of the security metrics on the example of attack potentiality. Proceedings of SPIIRAS. Issue 7 (30). St. Petersburg, Nauka, 2013. P.26-39. ISSN: 2078-9181. (in Russian).
  4. Elena Doynikova. Security metrics and security assessment techniques for the computer networks on the base of the attack graphs. Proceedings of SPIIRAS. Issue 3 (26). St. Petersburg, Nauka, 2013. P.5468. (in Russian).
  5. Igor Kotenko, Saenko I.B., Doynikova E.V. Risk assessment for the computer networks of the critical infrastructures. Innovations in Science, 16-1, 2013 / "Innovations in Science": Proceedings of XVI International Theoretical and Practical Conference. Part I. (28 January 2013); Novosibirsk: Publisher "SibAK", 2013. P.84-88. ISBN 978-5-4379-0210-3. (in Russian).
  6. Igor Kotenko, Elena Doynikova. Comprehensive Multilevel Security Risk Assessment of Distributed Information Systems. International Journal of Computing, Research Institute of Intelligent Computer Systems, Ternopil National Economic University. 2013, Vol.12, Issue 3. . 217-225 ISSN 1727-6209. https://computingonline.net/computing/article/view/602/564
  7. Doynikova E.V, Igor Kotenko. Security assessment for the computer networks on the base of the attack graphs and multilevel system of the security metrics. 22th All-Russian Conference Methods and technical tools of information security(MTTIS 2013). Proceedings. St.Petersburg, Russia. July 08-11, 2013. P.18-20. (in Russian).
  8. Igor Kotenko, Igor Saenko, Elena Doynikova, Olga Polubelova. Application of the ontology of the security metrics for the decision support in cyber security. 22th All-Russian Conference Methods and technical tools of information security(MTTIS 2013). Proceedings. St.Petersburg, Russia. July 08-11, 2013. P.32-33. (in Russian).
  9. Igor Saenko, Igor Kotenko, Olga Polubelova, Elena Doynikova. Application of the ontology of the security metrics for the selection of the countermeasures for the computer networks security. International congress IS&IT13 - International Conference on Artificial Intelligence and Systems. Proceedings. Moskow, Fizmathlit, 2013. Vol.2. P.372-377. ISBN 978-5-9221-1479-0. (in Russian).
  10. Igor Kotenko, Igor Saenko, Olga Polubelova, Elena Doynikova. Ontology of the security metrics for the computer network as basis for the selection of the countermeasures. VIII Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2013)", Saint-Petersburg, October 23-25, 2013. The proceedings of conference, 2013. P.108-109. (in Russian).
  11. Doynikova E.V. Approach to the security analysis for the distributed information systems on the base of the security metrics. VIII Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2013)", Saint-Petersburg, October 23-25, 2013. The proceedings of conference, 2013. P.94-95. (in Russian).
  12. Elena Doynikova. Development of the decision support system for the proactive response on the incidents of the information security. 18th St.Petersburg assembly of the young scientists and specialists. Proceedings.St.Petersburg, 2013. P.146. (in Russian).

2012

  1. Igor Kotenko, Andrey Chechulin and Elena Doynikova. Analytical Attack Modeling in Security Information and Event Management Systems. Proceedings of the Work in Progress Session held in connection with the 20th Euromicro International Conference on Parallel, Distributed and network-based Processing (PDP 2012). Garching/Munich, February 2012. SEA-Publications. SEA-SR-31. 2012. P.27-28.
  2. Igor Kotenko, Elena Doynikova. SCAP protocol overview. Information Security. Inside, 2, 2012. P.56-63. (in Russian).
  3. Igor Kotenko, Elena Doynikova, Andrey Chechulin. Total enumeration and classification of attack patterns (CAPEC): description and application examples. Information Security. Inside, 4, 2012. P.54-66. (in Russian).
  4. Elena Doynikova, Dmitry Kotenko, Igor Kotenko. Analysis of the intrusions using attack and service dependency graphs. 21th All-Russian Conference "Methods and technical tools of information security" (MTTIS 2012). Proceedings. St.Petersburg, Russia. June 24-29, 2012. P.45-47. (in Russian).
  5. Andrey Chechulin, Igor Kotenko, Evgenia Novikova, Elena Doynikova. Attacks and protection mechanisms in the security event and information management. 5th Russian Multiconference on Problems in Control (MPC). Conference on Information Technologies in Control (ITC).Proceedings. St.Petersburg, Russia. October 911, 2012. P.735-739. (in Russian).
  6. Elena Doynikova, Igor Kotenko. Integrated approach for security metric set constructing for risk assessment and reaction to intrusions. XIII Saint-Petersburg International Conference Regional informatics-2012 (RI-2012). Proceedings. St. Petersburg, 2012. P.94. (in Russian).

2011

  1. Igor Kotenko, Mikhail Stepashkin, Elena Doynikova. Security analysis of information systems taking into account social engineering attacks. Proceedings of the 19th Euromicro International Conference on Parallel, Distributed and network-based Processing (PDP 2011). Ayia Napa, Cyprus, 9-11 February, 2011. Los Alamitos, California. IEEE Computer Society. 2011. P.611-618. ISSN 1066-6192. (Scopus)
  2. Igor Kotenko, Andrey Chechulin, Elena Doynikova. Combining of Scanning Protection Mechanisms in GIS and Corporate Information Systems. Information Fusion and Geographic Information Systems. Proceedings of the 5th International Workshop on Information Fusion and Geographical Information Systems: Towards the Digital Ocean (IF&GIS 2011). Brest, France, May 10-11, 2011. Brest, France, 2011. Lecture Notes in Geoinformation and Cartography. Springer. 2011. P.45-58. ISSN 1863-2246. (Scopus)
  3. Igor Kotenko, Mikhail Stepashkin, Elena Doynikova. Security Analysis of Computer-aided Systems taking into account Social Engineering Attacks. Problems of information security. Computer systems. 2011, 3. P.40-57. (in Russian).
  4. Igor Kotenko, Mikhail Stepashkin, Dmitry Kotenko, Elena Doynikova. Information systems security evaluation on the base of social engineering attacks trees. Journal of Instrument Engineering , .54, 12, 2011. P.5-9. ISSN 0021-3454. (in Russian).
  5. Igor Kotenko, Elena Doynikova. Vulnerabilities assessment techniques: use for the computer systems security analysis. Information Security. Inside, 4, 2011. P.74-81. (in Russian).
  6. Igor Kotenko, Elena Doynikova. Vulnerabilities Scoring System CVSS and its application for the computer systems security analysis. Information Security. Inside, 5, 2011. P.54-60. (in Russian).
  7. Igor Kotenko, Elena Doynikova. Misuse and configuration scoring systems (CMSS and CCSS) for the unified computer systems security analysis. Information Security. Inside, 6, 2011. P.52-60. (in Russian).
  8. Elena Doynikova, Igor Kotenko. Extension of the informasion risks assessment techniques via application of the service dependency graphs. 20th All-Russian Conference Methods and technical tools of information security (MTTIS 2011). Proceedings. St.Petersburg, Russia. June 27 - July 01, 2011. P.131-132. (in Russian).
  9. Elena Doynikova, Dmitry Kotenko. Application of the vulnerabilities scoring systems to the computer systems security analysis. Tools for security analysis of automated systems. 20th All-Russian Conference Methods and technical tools of information security (MTTIS 2011). Proceedings. St.Petersburg, Russia. June 27 - July 01, 2011. P.130-131. (in Russian).
  10. Elena Doynikova, Andrey Chechulin, Igor Kotenko, Dmitry Kotenko. Extension of the information risks assessment technique to consider zero day attacks.VII St.Petersburg Interregional Conference Information Security of Russian Regions (IBRR-2011). October 26-28, 2011. Proceedings. St.Petersburg, 2011. P.71-72. (in Russian).
  11. Elena Doynikova, Dmitry Kotenko. Extension of the information risks assessment technique via application of service dependencies graphs. VII St.Petersburg Interregional Conference Information Security of Russian Regions (IBRR-2011). October 26-28, 2011. Proceedings. St.Petersburg, 2011. P.70-71. (in Russian).
  12. Oleg Zadan, Elena Doynikova. The problem of management of role-based access to information in a single information space. International scientific and practical conference Promising innovations in science, education, production and transport 2011. Proceeding.Vol.5. Technical science. Odessa: Chernomorya. 2011. P.92. (in Russian).
  13. Igor Saenko, Elena Doynikova, Oleg Zadan. About the actual tasks of the management of the role-based information access systems in a single information space. International scientific and practical conference Research and their practical application. Current status and development - 2011.Proceeding. Vol.3. Technical science. Odessa: Chernomorya. 2011. P.82-83. (in Russian).

2010

  1. Igor Kotenko, Mikhail Stepashkin, Andrey Chechulin, Elena Doynikova, Dmitry Kotenko. Tools for security analysis of automated systems. IX All-Russian Conference Methods and technical tools of information security (MTTIS 2010). Proceedings. St.Petersburg, Russia. July 5-10, 2010. P.115-116. (in Russian).
  2. Elena Doynikova. Risk assessment approaches based on attack graphs. XII Saint-Petersburg International Conference Regional informatics-2010 (RI-2010). Proceedings. St. Petersburg, October 20-22, 2010. P.99-100. ISBN 978-5-904031-99-2. (in Russian).
  3. Elena Doynikova. Applying the fuzzy sets for risk assessment based on attack graphs. XII Saint-Petersburg International Conference Regional informatics-2010 (RI-2010). Proceedings. St. Petersburg, October 20-22, 2010. P.100. ISBN 978-5-904031-99-2. (in Russian).

Top 

RUSSIA, 199178, Saint-Petersburg, liniya 14-ya, 39, SPC RAS (metro station Vasileostrovskaya).
+7-(812)-328-7181, +7-(812)-328-2642, ivkote[AT]comsec[DOT]spb[DOT]ru

Comments? Questions? chechulin[AT]comsec[DOT]spb[DOT]ru

Locations of visitors to this page