| News | Staff | Projects | Awards | Patents | Results | Conferences | Collaboration | ISL ISoCPS | Publications | Events | Matherials |
 | Links | Contacts |
rus | eng |
  

Izrailov Konstantin Evgenievich



E-mail: izrailov[AT]comsec[DOT]spb[DOT]ru
http://comsec.spb.ru/izrailov/

Top 

Main publications

Books and Chapters in Books

  1. M.V. Buinevich, K.E. Izrailov. Fundamentals of cybersecurity: methods of protection from program analysis // Textbook for students of higher educational institutions in an enlarged group of specialties and directions "Information security" / St. Petersburg, 2022., 76 ð. // https://elibrary.ru/yfdezh // https://elibrary.ru/item.asp?id=49180160
  2. S.V. Meshcheryakov, D.A. Shchemelinin, K.E. Izrailov. Principles of organization and monitoring of cloud multiservice systems // Monograph. P. 165, Saint Petersburg, 2022. // https://elibrary.ru/item.asp?id=48508667
  3. M.V. Buinevich, K.E. Izrailov. Fundamentals of cybersecurity: methods of program analysis // Textbook for students of higher educational institutions in an enlarged group of specialties and directions "Information security" P.92, St. Petersburg, 2022. // https://www.elibrary.ru/item.asp?id=49178863
  4. T.I. Abdullin, V.D. Baev, M.V. Buinevich, D.D. Burzunov, I.N. Vasilyeva, E.F. Galiullina, U.A. Gatchin, I.G. Gnidenko, N.A. Gorokhov, I.V. Gorstkin, A.B. Dolzhenko, I. V. Egorova, L.A. Enikeeva, V.S. Efimov, A.R. Zhirov, K.E. Izrailov, E.V. Krasilnikova, A.M. Krasnenkov, A.S. Laskus, A. I. Loknov, E.V. Mayorova, O.D. Merdina, S.K. Morozov, V. G. Petrov, A.M. Polegenko, A.A. Prostak, V.N. Rodin, N.A. Savelyeva, V. Salnikov, E.S. Sidorov, N.S. Smirnov, T.V. Smirnova, S.A. Sokolovskaya, A.V. Solodyannikov, V.L. Stelmashonok, E.V. Stelmashonok, V.V. Sukhostat, N.I. Syasin, I.S. Tveritin, D.Yu. Fedorov, V.D. Filippov, G.M. Chernoknizhny, D.I. Yakushev, V.V. Trofimov. Digital Technologies and problems of information security // St. Petersburg State University of Economics. 2021.monograph 163p. // https://elibrary.ru/item.asp?id=45735887
  5. M.V. Buinevich, K.E. Izrailov, A.V. Krasov. Protection of programs and data. Methods of analysis // Textbook. Federal Communications Agency, Federal State Budgetary Educational Institution of Higher Education "St. Petersburg State University of Telecommunications named after Prof. M. A. Bonch-Bruevich" (SPbSUT). St. Petersburg, 2020. - 72 p., Document code in the NEB 000199_000009_010520755
  6. M.V. Buinevich, I.N. Vasilyeva, T.M. Vorobyev, I.G. Gnidenko, I.V. Egorova, L.A. Enikeeva, S.G. Zelman, K.E. Izrailov, S.R. Ishankhanov, V.I. Kuvatov, O.V Loktionov, P.A. Malakhova, O.D. Merdina, A.M. Polegenko, M.A. Popov, A.I. Primakin, T.G. Semenova, S.O. Semenova, A.I. Solov'ev, S.A. Solov'ev, etc. Information protection in computer systems // Saint Petersburg, 2017. Monograph. 163 p.// https://elibrary.ru/item.asp?id=32254007

Papers

2024

  1. K.E. Izrailov. The genetic de-evolution concept of program representations. Part 1 // Cybersecurity issues. 2024. No. 1 (59). pp. 61-66. DOI: 10.21681/2311-3456-2024-1-61-66 // https://elibrary.ru/item.asp?id=59932753 (in Russian).
  2. K.I. Izrailov. Methodology for reverse engineering of machine code. Part 3. Dynamic investigation and documentation // Proceedings of educational institutions of communications. 2024. Vol. 10. No. 1. pp. 86-96. DOI: 10.31854/1813-324X-2024-10-1-86-96 // https://www.elibrary.ru/item.asp?id=62236374 (in Russian).
  3. K.E. Izrailov. The genetic de-evolution concept of program representations. Part 2 // Cybersecurity issues. 2024. No. 2 (60). pp. 81-86. DOI: 10.21681/2311-3456-2024-2-81-86 // https://elibrary.ru/item.asp?id=65314215 (in Russian).

2023

  1. I. Kotenko, K. Izrailov, M. Buinevich. The Method and Software Tool for Identification of the Machine Code Architecture in Cyberphysical Devices // Journal of Sensor and Actuator Networks. 2023. Vol. 12(1), pp. 11. DOI: 10.3390/jsan12010011. // https://www.elibrary.ru/item.asp?id=60636071
  2. I. Kotenko, K. Izrailov, M. Buinevich, I. Saenko, R. Shorey. Modeling the Development of Energy Network Software, Taking into Account the Detection and Elimination of Vulnerabilities // Energies. 2023. Vol. 16. Iss. 13. PP. 5111. DOI:10.3390/en16135111
  3. K.E. Izrailov. Modeling a program with vulnerabilities in the terms of its representations evolution. Part 1. Life cycle scheme // Proceedings of educational institutions of communication. 2023. Vol. 9. No. 1. pp. 75-93. DOI: 10.31854/1813-324X-2023-9-1-75-93 // https://elibrary.ru/item.asp?id=50416979 (in Russian).
  4. K.E. Izrailov, A.K. Makarova, A.V. Shestakov. Generalized model of protection against cyberattacks on VOIP // Cybersecurity issues. 2023. No. 2 (54). pp. 109-121. DOI: 10.21681/2311-3456-2023-2-109-121 // https://elibrary.ru/item.asp?id=54282358 (in Russian).
  5. A.V. Yakovlev, E.V. Tarov, K.E. Izrailov, A.A. Chechulin. Method for detecting source code duplicates based on the random walk algorithm // Scientific and analytical journal "Bulletin of the St. Petersburg University of the State Fire Service of the Ministry of Emergency Situations of Russia". 2023. No. 2. P. 134-146. // https://www.elibrary.ru/item.asp?id=54153824 (in Russian).
  6. E.S. Novikova, I.V. Kotenko, A.V. Meleshko, k.E. Izrailov. federated learning based intrusion detection: system architecture and experiments // Issues of cybersecurity. 2023. No. 6 (58). pp. 50-66. DOI: 10.21681/2311-3456-2023-6-50-66 // https://elibrary.ru/item.asp?id=54966746 (in Russian).
  7. K.E. Izrailov, M.V. Buinevich. Different genesis attacks to complex objects detecting method based on condition information. Part 1. Prerequisites and schema // Cybersecurity issues. 2023. 3(55). pp. 90-100. DOI: 10.21681/2311-3456-2023-3-90-100 // https://www.elibrary.ru/item.asp?id=54303096 (in Russian).
  8. K.E. Izrailov. Methodology for machine code reverse engineering. Part 1. Preparation of the research object. // Proceedings of educational institutions of communications. 2023. Vol. 9. No. 5. pp. 79-90. DOI: 10.31854/1813-324X-2023-9-5-79-90 // https://www.elibrary.ru/item.asp?id=54890076 (in Russian).
  9. K.E. Izrailov. Methodology for machine code reverse engineering. Part 2. Static investigation //Proceedings of educational institutions of communication. 2023. Vol. 9. No. 6. pp. 68-82. DOI: 10.31854/1813-324X-2023-9-6-68-82 // https://www.elibrary.ru/item.asp?id=56946396 (in Russian).
  10. K.E. Izrailov. Modeling a program with vulnerabilities in the terms of its representations evolution. Part 2. Analytical model and experiment // Proceedings of educational institutions of communications. 2023. Vol. 9. No. 2. pp. 95-111. DOI: 10.31854/1813-324X-2023-9-2-95-111 // https://www.elibrary.ru/item.asp?id=53927921 (in Russian).
  11. A.V. Yakovlev, K.E. Izrailov. Survey of existing methods for detecting source code duplicates //National security and strategic planning. 2023. No. 1 (41). pp. 86-92. DOI: 10.37468/2307-1400-2023-1-86-92 // https://www.elibrary.ru/item.asp?id=54391110 (in Russian).
  12. K.E. Izrailov, N.A. Ponomarev, E.V. Tarkhov. Analysis of time series forecasting models for predicting trends in the development of information security threats // Actual problems of infotelecommunications in science and education (APINO-2023). XII International scientific-technical and scientific-methodological conference; collection of scientific articles in 4 volumes / Edited by S.I. Makarenko; comp. V.S. Elagin, E.A. Anikevich. – St. Petersburg: SPbSUT. 2023. 1. pp. 572-577 // https://www.elibrary.ru/item.asp?id=54033645 (in Russian).
  13. K.E. Izrailov, I.V. Umaraliev. A hypothetical method of recovery of machine code architecture modules to identify high-level vulnerabilities // Actual problems of infotelecommunications in science and education (APINO-2023). XII International Scientific, technical and scientific-methodological conference; collection of scientific articles in 4 volumes / Edited by S.I. Makarenko; comp. V.S. Elagin, E.A. Anikevich. – St. Petersburg: SPbGUT. 2023. 1. pp. 577-581 // https://elibrary.ru/item.asp?id=54033646&pff=1 (in Russian).
  14. K.E. Izrailov, A.Yu. Yaroshenko. Investigation of the machine learning opportunities for automatic ranking of vulnerabilities according to their text description // Actual problems of infotelecommunications in science and education (APINO-2023). XII International Scientific, technical and scientific-methodological conference; collection of scientific articles in 4 volumes / Edited by S.I. Makarenko; comp. V.S. Elagin, E.A. Anikevich. – St. Petersburg: SPbGUT. 2023. 1. pp. 586-590 // https://elibrary.ru/item.asp?id=54033648&pff=1 (in Russian).
  15. K.E. Izrailov, E.I. Chasovskikh. Comparative analysis of security solutions from unauthorized software distribution // Actual problems of infotelecommunications in science and education (APINO-2023). XII International scientific-technical and scientific-methodological conference; collection of scientific articles in 4 volumes / Edited by S.I. Makarenko; comp. V.S. Elagin, E.A. Anikevich. – St. Petersburg: SPbGUT. 2023. 1. pp. 581-586 // https://elibrary.ru/item.asp?id=54033647&pff=1 (in Russian).
  16. L.R. Elizarova, K.E. Izrailov. Classification of information security areas using categorical division // Actual problems of infotelecommunications in science and education (APINO-2023). XII International scientific-technical and scientific-methodological conference; collection of scientific articles in 4 volumes / Edited by S.I. Makarenko; comp. V.S. Elagin, E.A. Anikevich. – St. Petersburg: SPbSUT. 2023. 1. pp. 475-479 // https://elibrary.ru/item.asp?id=54033624&pff=1 (in Russian).

2022

  1. Igor Kotenko, Konstantin Izrailov, Michael Buinevich. Static analysis of information systems for iot cyber security: a survey of machine learning approaches // Sensors. 2022. Vol. 22. ¹ 4, Ïîðÿäêîâûé íîìåð: 1335. DOI: 10.3390/s22041335 // https://elibrary.ru/item.asp?id=48149031
  2. Igor Kotenko, Konstantin Izrailov, Michael Buinevich. Analytical modeling for identification of the machine code architecture of cyberphysical devices in smart homes // Sensors. 2022. Ò. 22. ¹ 3. Serial number: 1017, DOI: 10.3390/s22031017 // https://elibrary.ru/item.asp?id=48145501
  3. Anton Chudakov, Konstantin Izrailov, Igor Kotenko I.V. Discussion paper: forecasting the possibilitiesof non-euclidan geometry in information security // Informatization and Communications. 2022. No. 3. pp. 15-21. DOI: 10.34219/2078-8320-2022-13-3-15-21 // https://elibrary.ru/item.asp?id=49389506 (in Russian).
  4. K.E. Izrailov, M.V. Buinevich, I.V. Kotenko, V.A. Desnitsky. Assessment and prediction of the complex objects state: application for information security // Issues of cybersecurity. 2022. No. 6 (52). pp. 2-21. DOI: 10.21681/23113456-6-2022-2-21 // https://elibrary.ru/item.asp?id=50329071 (in Russian).
  5. M.V. Buinevich, K.E. Izrailov, V.V. Pokusov, N.E. Romanov. A method of variable classification of vulnerabilities in software code. Part 2. Automation based on machine learning // Automation in industry. 2022. No. 4. pp. 49-55. DOI: 10.25728/avtprom.2022.04.10 // https://elibrary.ru/item.asp?id=48272977 (in Russian).
  6. Ksenia Zhernova, Konstantin Izrailov, Maxim Kolomeets, Dmitry Levshun, Andrey Chechulin. Conceptual model of the "system-operator" interaction interface based on visualization technologies that take into account the human cognitive apparatus // In the collection: Actual problems of infotelecommunications in science and education (APINO 2022). XI International Scientific-technical and scientific-methodical conference. St. Petersburg, 2022. pp. 460-463. // https://elibrary.ru/item.asp?id=49522737 (in Russian).
  7. K.E. Izrailov, N.E. Romanov. Application of a genetic algorithm for reverse engineering of machine code // In the collection: Actual problems of infotelecommunications in science and education (APINO 2022). Collection of scientific articles of the XI International scientific-technical and scientific-methodical conference. St. Petersburg, 2022. pp. 239-243. // https://elibrary.ru/item.asp?id=49588777 (in Russian).
  8. K.E. Izrailov, P.A. Kurta. Vulnerability modeling in smart city transport infrastructure interfaces // In the book: Materials of the conference "Information Technologies in Management" (ITU-2022). 15th Multi-conference on Management Issues. Abstracts of the report at the conference, St. Petersburg, 2022. pp. 237-240. // https://elibrary.ru/item.asp?id=50211049 (in Russian).

2021

  1. Konstantin Izrailov, Michael Buinevich, Igor Kotenko, À. Yaroshenko. Identifying characteristics of software vulnerabilities by their textual description using machine learning // Â ñáîðíèêå: World Automation Congress Proceedings. Ñåð. "2021 World Automation Congress, WAC 2021" 2021. Ñ. 186-192. DOI: 10.23919/WAC50355.2021.9559470 // https://elibrary.ru/item.asp?id=47513415
  2. V.K. Fedorov, E.G. Balenko, N.V. Gololobov, K.E. Izrailov. Testing platform invoke as a tool for shellcode injection in windows applications // Â ñáîðíèêå: Journal of Physics: Conference Series. Ñåð. "International Conference on Automatics and Energy, ICAE 2021" 2021. Ñ. 012048. DOI: 10.1088/1742-6596/2096/1/012048 // https://elibrary.ru/item.asp?id=47547489
  3. Konstantin Izrailov, Dmitry Levshun, Andrey Chechulin. Vulnerability classification model for Smart City transport infrastructure interfaces. Systems of Control, Communication and Security, 2021, no. 5, pp. 199-223. DOI: 10.24412/2410-9916-2021-5-199-223 // https://elibrary.ru/item.asp?id=47141867 (in Russian).
  4. M.V. Buinevich, V.V. Pokusov, K.E. Izrailov. Threats model of information and technical interaction in the integrated information protection system // Informatization and communication. 2021. No. 4. pp. 66-73. DOI: 10.34219/2078-8320-2021-12-4-66-73 // https://elibrary.ru/item.asp?id=46166157 (in Russian).
  5. K.E. Izrailov. Generalized classification of vulnerabilities of interfaces to the transport infrastructure of the Smart city // Information Technologies. 2021. Vol. 27. No. 6. pp. 330-336. DOI: 10.17587/it.27.330-336 // https://elibrary.ru/item.asp?id=46264778 (in Russian).
  6. N.E. Romanov, K.E. Izrailov, V.V. Pokusov. Intelligent Programming Support System: Machine Learning FEAT. fast development of secure programs // Informatization and Communications. 2021. No. 5. pp. 7-16. DOI: 10.34219/2078-8320-2021-12-5-7-16 // https://elibrary.ru/item.asp?id=46659846 (in Russian).
  7. M.V. Buinevich, K.E. Izrailov, V.V. Matveev, V.V. Pokosov. Method of variable classification of vulnerabilities in software code. Part 1. Stratification and categorical division // Automation in industry. 2021. No. 11. pp. 42-49. DOI: 10.25728/avtprom.2021.11.09 // https://elibrary.ru/item.asp?id=47189511 (in Russian).
  8. K.E. Izrailov. Genetic decompilation concept of the telecommunication devices machine code // Proceedings of educational institutions of communications. 2021. Vol. 7. No. 4. pp. 95-109. DOI: 10.31854/1813-324X-2021-7-4-95-109 // https://elibrary.ru/item.asp?id=47488978 (in Russian).
  9. M.V. Buinevich, K.E. Izrailov, V.V. Pokusov V.V. Language of the program code uniform presentation for searching medium- and high-level vulnerabilities: the basic provisions of paradigm // Cybersecurity issues. 2021. No. 6 (46). pp. 78-89. DOI: 10.21681/2311-3456-2021-6-78-89 // https://elibrary.ru/item.asp?id=47327015 (in Russian).
  10. M.A. Skorykh, K.E. Izrailov, A.V. Bashmakov. Task oriented comparison of network traffic analysis tools // In the collection: Theory and practice of information security. Collection of scientific papers based on the materials of the All-Russian scientific and theoretical conference. 2021. pp. 103-107. // https://elibrary.ru/item.asp?id=49246459 (in Russian).
  11. M.V. Buinevich, K.E. Izrailov, A.A. Krivenko. Cybersecurity gaming training systems: review and criteria comparison // Bulletin of the St. Petersburg State University of Technology and Design. Series 1: Natural and Technical Sciences. 2021. No. 4. pp. 5-13. DOI: 10.46418/2079-8199_2021_4_1 // https://elibrary.ru/item.asp?id=47935485 (in Russian).
  12. K.E. Izrailov, V.V. Pokusov. Software platform architecture for converting machine code into a high-level representation for expert search of vulnerabilities // Electronic network polythematic journal "Scientific works of KubSTU". 2021. No. 6. pp. 93-111. // https://elibrary.ru/item.asp?id=47970524 (in Russian).
  13. N.V. Gololobov, K.E. Izrailov. Investigating a way to call an insecure kernel API on Windows OS // In the collection: Actual problems of infotelecommunications in science and education. collection of scientific articles: in 4 volumes. St. Petersburg State University of Telecommunications named after Prof. M.A. Bonch-Bruevich. Saint Petersburg, 2021. Vol.1, pp. 248-252. // https://elibrary.ru/item.asp?id=46275402 (in Russian).
  14. K.E. Izrailov, V.V. Pokusov. Creation of a software object-oriented platform for the development of UEFI modules // Actual problems of infotelecommunications in science and education (APINO-2021). X Anniversary International scientific-technical and scientific-methodical conference; collection of scientific articles in 4 vol. 2021. Volume 2. pp. 246-250 https://www.sut.ru/doci/nauka/1AEA/APINO/10-APINO-2021.Ò.2.pdf // https://elibrary.ru/item.asp?id=46545667 (in Russian).
  15. M.V. Buinevich, K.E. Izrailov, V.V. Pokusov, A.Yu. Yaroshenko. On the architecture of complex and integrated security systems: protocol-oriented approach // In the collection: Current problems of protection and security. Proceedings of the XXIV All-Russian Scientific and Practical Conference RARAN. Moscow, 2021. pp. 377-383. // https://elibrary.ru/item.asp?id=47472530 (in Russian).
  16. K.E. Izrailov. Improving the interfaces of specialized mobile applications of the Ministry of Emergency Situations of Russia // In the collection: Transport of Russia: problems and prospects - 2021. Materials of the International Scientific and Practical Conference. Saint Petersburg, 2021. pp. 82-88. // https://elibrary.ru/item.asp?id=48702890 (in Russian).

2020

  1. Kotenko Igor, Krasov Andrey, Ushakov Igor and Izrailov Konstantin. Detection of Stego-Insiders in Corporate Networks Based on a Hybrid NoSQL Database Model // ACM International Conference Proceeding Series. 4. Ñåð. "Proceedings of the 4th International Conference on Future Networks and Distributed Systems, ICFNDS 2020" 2020. Ñ. 3442612. DOI: 10.1145/3440749.3442612 // https://elibrary.ru/item.asp?id=46072420
  2. K. Izrailov, A. Chechulin, L. Vitkova. Threats classification method for the transport infrastructure of a smart city // Â ñáîðíèêå: 14th IEEE International Conference on Application of Information and Communication Technologies, AICT 2020 - Proceedings. 14. 2020. Ñ. 9368828. DOI: 10.1109/AICT50176.2020.9368828 // https://www.elibrary.ru/item.asp?id=46760875
  3. M. Buinevich, K. Izrailov, G. Ganov. Intellectual method of program interactions visualisation in unix-like systems for information security purposes // Â ñáîðíèêå: CEUR Workshop Proceedings. 12. Ñåð. "MICSECS 2020 - Proceedings of the 12th Majorov International Conference on Software Engineering and Computer Systems" 2020. Ñ. 59-71.// https://www.elibrary.ru/item.asp?id=46875073
  4. M. V. Buinevich, K. E. Izrailov, V. V. Pokusov, V. A. Taylakov, I. N. Fedulina An intelligent method of machine code algorithmization for vulnerabilities search // Information Security. Insider. 2020. No. 5 (95). pp. 57-63 // https://www.elibrary.ru/item.asp?id=44133751 (in Russian).
  5. M.V. Buynevich, K. E. Izrailov. Analytical modeling of the vulnerable program code execution // Cybersecurity. 2020. No. 3(37). pp. 2-12. DOI: 10.21681/2311-3456-2020-03-02-12 // https://www.elibrary.ru/item.asp?id=43976791 (in Russian).
  6. M.V. Buinevich, K.E. Izrailov. Identification of processor’s architecture of executable code based on machine learning. Part 1. Frequency byte model // Proceedings of educational institutions of communication. 2020. Vol.6 No. 1. pp. 77-85. DOI: 10.31854/1813-324X-2020-6-1-77-85 // https://www.elibrary.ru/item.asp?id=42752699 (in Russian).
  7. M.V. Buinevich, K.E. Izrailov. Identification of processor’s architectureof executable code based on machine learning.Part 2. Identification method // Proceedings of educational institutions of communication. 2020. Vol. 6 No. 2. pp. 104-112. DOI: 10.31854/1813-324X-2020-6-2-104-112 // https://www.elibrary.ru/item.asp?id=43084686 (in Russian).
  8. M.V. Buinevich, K.E. Izrailov. Identification of processor’s architecture of executable code based on machine learning. Part 3. Assessment quality and applicability border // Proceedings of educational institutions of communication. 2020. Vol. 6 ¹ 3. pp. 48-57. DOI: 10.31854/1813-324X-2020-6-3-48-57 // https://www.elibrary.ru/item.asp?id=44012810 (in Russian).
  9. M.V. Buynevich, K.E. Izrailov. Generalized model of static analysis of program code based on machine learning in relation to the problem of vulnerability search // Informatization and Communication. 2020. No. 2. pp. 143-152. DOI: 10.34219/2078-8320-2020-11-2-143-152 // https://www.elibrary.ru/item.asp?id=42976426 (in Russian).
  10. M.V. Buinevich, K.E. Izrailov. Method for classification of files on the basis of machine training technology // Bulletin of the St. Petersburg State University of Technology and Design. Series 1: Natural and Technical Sciences. 2020. No. 1. Ð. 34-41 DOI: 10.46418/2079-8199_2020_1_6 // https://www.elibrary.ru/item.asp?id=43121338 (in Russian).
  11. Yu.N. Bolshakov, M.J. Bolshakov, K.E. Izrailov, A.V. Romanenko. Visualization of information exchange in the context of Industry 4.0 vision // Automation in industry. 2020. No. 8. pp. 23-29. DOI: 10.25728/avtprom. 2020. 08. 06 // https://www.elibrary.ru/item.asp?id=43836926 (in Russian).
  12. K.E. Izrailov. Visualization of many featured software vulnerabilities using the principal component analysis // Bulletin of the St. Petersburg State University of Technology and Design. Series 1: Natural and Technical Sciences. 2020. ¹ 1. Ð. 3-8. DOI: 10.46418/2079-8199_2020_1_1 // https://www.elibrary.ru/item.asp?id=43121333 (in Russian).
  13. K.E. Izrailov. Applying of genetic algorithms to decompile machine code // Information Protection. Insider. 2020. No. 3(39). pp. 24-30 // https://www.elibrary.ru/item.asp?id=42976228 (in Russian).
  14. K.E. Izrailov, AI. Obrezkov. An approach to identifying the sequence of single-target network attacks with visualization of their progress to an expert // Methods and technical means of ensuring the security of information. 2020. No. 29. P. 68-69 // https://www.elibrary.ru/item.asp?id=44017276 (in Russian).
  15. M.V. Buinevich, G.A. Khanov, K.E. Izrailov. Intellectual method of programs interactions visualization for information security audit of the operating system // Informatization and Communications. 2020. No. 4. pp. 67-74. DOI: 10.34219/2078-8320-2020-11-4-67-74 // https://www.elibrary.ru/item.asp?id=44312282 (in Russian).
  16. M.V. Buinevich, K.E. Izrailov, V.V. Pokusov, A.Yu. Yaroshenko. Main principles of designing the modern protection systems architecture // National security and strategic planning. 2020. No. 3 (31). pp. 51-58. DOI: 10.37468/2307-1400-2020-3-51-58 // https://www.elibrary.ru/item.asp?id=44342138 (in Russian).
  17. K.E. Izrailov, P.E. Zhukovskaya, P.A. Kurta, A.A.Chechulin. Research of the method for determining the password resistance to brute force on the basis of an artificial neural network // In the collection: Information technologies in management. conference materials. Saint Petersburg, 2020. pp. 273-276. // https://www.elibrary.ru/item.asp?id=44686239 (in Russian).
  18. L.A. Vitkova, K E. Izrailov, A A. Chechulin. Classification of vulnerability of interfaces transport infrastructure of a smart city // IX International scientific-technical and scientific-methodological conference " Actual problems of infotelecommunications in science and education "(APINO-2020)". February 26-27, 2020. Collection of scientific articles. 2020. Vol. 1. P. 253-258. // https://www.elibrary.ru/item.asp?id=44604006&pff=1 (in Russian).
  19. K. E. Izrailov, K. N. Zhernova. Intellectual methods of classification of a smart city transport infrastructure // Perspective directions of development of domestic information technologies: materials of the VI Interregional scientific and practical conference, Sevastopol, September 22-26, 2020, pp. 160-161 http://www.spoisu.ru/files/pnroit/pnroit-2020_materials.pdf // https://elibrary.ru/item.asp?id=45844789 (in Russian).
  20. K.E. Izrailov, S.A. Kuznetsov. The use of artificial intelligence and machnie learning methods to search for vulnerabilities in source code // In the collection: Actual problems of infotelecommunications in science and education (APINO 2020). Collection of scientific articles of the IX International Scientific-technical and scientific-methodical Conference. In 4 volumes. St. Petersburg, 2020. pp. 361-366. // https://www.elibrary.ru/item.asp?id=44610403 (in Russian).
  21. K.E. Izrailov, I.M. Tatarnikova, A.V. Fedorova, V.Yu. Shiryaev. Comparative analysis of plagiarism checkers // In the collection: Actual problems of infotelecommunications in science and education (APINO 2020). Collection of scientific articles of the IX International Scientific-technical and scientific-methodical Conference. In 4 volumes. St. Petersburg, 2020. pp. 366-371.// https://www.elibrary.ru/item.asp?id=44610404 (in Russian).

2019

  1. K.E. Izrailov, N.V. Gololobov, G.A. Raskin. Method of malware analysis based on FUZZY HASH // Informatization and Communication 2019. No. 2. pp. 36-44. DOI: 10.34219/2078-8320-2019-10-2-36-44 // https://elibrary.ru/item.asp?id=37576030 (in Russian).
  2. M.V. Buinevich, K.E. Izrailov. Anthropomorphic approach to description of the vulnerabilities interaction in program code. Part 1. Types of interactions // Information protection. Inside. 2019. No. 5 (89). pp. 78-85. // https://elibrary.ru/item.asp?id=41221386 (in Russian).
  3. M.V. Buinevich, K.E. Izrailov. Anthropomorphic approach to description of the vulnerabilities interaction in program code. Part. 2. Metric of vulnerabilities // Information protection. Inside. 2019. No. 6 (90). pp. 61-65. // https://elibrary.ru/item.asp?id=41494732 (in Russian).
  4. M.V. Buinevich, P.E. Zhukovskaya, K.E. Izrailov, V.V. Pokusov. Application of machine training to search vulnerabilities in the software code // Information technologies and telecommunications. 2019. Vol. 7. No. 4. pp. 59-65.DOI: 10.31854/2307-1303-2019-7-4-50-56 // https://elibrary.ru/item.asp?id=43921815 (in Russian).
  5. K.E. Izrailov, I.M. Tatarnikova. An approach to analyzing the security of a software code from the standpoint of its form and content // In the collection: Actual problems of infotelecommunications in science and education (APINO 2019). collection of scientific articles of the VIII International Scientific-technical and Scientific-methodological Conference: in 4 t.. 2019. pp. 462-467. // https://elibrary.ru/item.asp?id=41383575 (in Russian).

2018

  1. M.V. Buinevich, K.E. Izrailov, V.V. Pokusov,S.V. Sharapov, S.N. Terekhin. Generalized interaction model in the information system // International Journal of Pure and Applied Mathematics. 2018. Ò. 119. ¹ 17. Ñ. 1381-1385. // https://elibrary.ru/item.asp?id=35321842
  2. M. Buinevich, K. Izrailov, E. Stolyarova, A. Vladyko. Combine method of forecasting vanet cybersecurity for application of high priority way // Â ñáîðíèêå: 2018 20th International Conference on Advanced Communication Technology (ICACT). conference proceedings. 2018. Ñ. 266-271. DOI: 10.23919/ICACT.2018.8323720 // https://elibrary.ru/item.asp?id=35063552
  3. M.V. Buinevich, V.V. Pokusov, K.E. Izrailov. Method of visualizing the modules of the information security system // Scientific and Analytical journal "Bulletin of the St. Petersburg University of the State Fire Service of the Ministry of Emergency Situations of Russia". 2018. No. 3. pp. 81-91. // https://elibrary.ru/item.asp?id=36263686 (in Russian).
  4. M.V. Buinevich, V.V. Pokusov, K.E. Izrailov. Interaction effects of enterprise providing subsystems of information service (as example is used fire safety service) // Scientific and Analytical journal "Bulletin of the St. Petersburg University of the State Fire Service of the Ministry of Emergency Situations of Russia". 2018. No. 4. pp. 48-55. // https://elibrary.ru/item.asp?id=37272518 (in Russian).
  5. V.A.Tailakov, K.E. Izrailov. Methods of automating the search for vulnerabilities in software at the appropriate levels of its development // Scientific aspect. 2018. Vol. 6. No. 4. pp. 719-726.// https://elibrary.ru/item.asp?id=36942713 (in Russian).
  6. K.E. Izrailov, V.V. Pokusov, E.S. Stolyarova. Information objects in the system of ensuring information security // In the collection: Theoretical and applied issues of complex security. Materials of the I International Scientific and Practical Conference. Petrovsky Academy of Sciences and Arts. 2018. pp. 166-169. // https://elibrary.ru/item.asp?id=34924831 (in Russian).

2017

  1. M. Buinevich, K. Izrailov, A. Vladyko. Testing of utilities for finding vulnerabilities in the machine code of telecommunication devices // Â ñáîðíèêå: 2017 19th International Conference on Advanced Communication Technology (ICACT). 19, Opening Era of Smart Society. Ñåð. "19th International Conference on Advanced Communications Technology: Opening Era of Smart Society, ICACT 2017 - Proceeding" 2017. Ñ. 408-414. DOI: 10.23919/ICACT.2017.7890122 // https://elibrary.ru/item.asp?id=28900838
  2. K.E. Izrailov. A system of criteria for evaluating methods to search for vulnerabilities and a metric of comprehensibility of program code representation // Informatization and communication. 2017. No. 3. pp. 111-118 // https://elibrary.ru/item.asp?id=29108491 (in Russian).
  3. K.E. Izrailov, V.V. Pokusov. Actual issues of interaction of elements of complex information security systems // In the collection: Actual problems of infotelecommunications in science and education. collection of scientific articles: in 4 volumes. Edited by S.V. Bachevsky. 2017. pp. 255-260. // https://elibrary.ru/item.asp?id=32650680 (in Russian).
  4. A.A. Biryukov, K.E. Izrailov. The comparative analysis of models of threats of information security for the benefit of applicability for multi-stage schemes of the attacks // In the collection: Actual problems of infotelecommunications in science and education (APINO 2017). Collection of scientific articles of the VI International Scientific-technical and scientific-methodical Conference. In 4 volumes. Edited by S.V. Bachevsky. 2017. pp. 108-112. // https://elibrary.ru/item.asp?id=32578093 (in Russian).

2016

  1. M. Buinevich, K. Izrailov, A. Vladyko. Method and prototype of utility for partial recovering source code for low-level and medium-level vulnerability search // Â ñáîðíèêå: 2016 18th International Conference on Advanced Communication Technology (ICACT). 2016. Ñ. 700-707. DOI: 10.1109/ICACT.2016.7423603 // https://elibrary.ru/item.asp?id=25873415
  2. K. E. Izrailov, V.V. Pokusov. Utility for vulnerability search in a software of telecommunication devices by method algoritmization of machine code. Part 3. Modular-algorithmic architecture // Information technology and telecommunications. 2016. Vol. 4. No. 4. pp. 104-121. // https://elibrary.ru/item.asp?id=29041144 (in Russian).
  3. M.V Buinevich M.V., K.E. Izrailov, D.I. Mostovich, A.Yu. Yaroshenko. Problematic issues of neutralization of vulnerabilities in a software code of telecommunication devices // Problems of risk management in the technosphere. 2016. No. 3 (39). pp. 81-89.// https://elibrary.ru/item.asp?id=27162851 (in Russian).
  4. M.V. Buinevich, K.E. Izrailov. Utility for vulnerability search in a software of telecommunication devices by method algoritmization of machine code. Part 1. Functional architecture // Information technologies and telecommunications. 2016. Vol. 4. No. 1. pp. 115-130. // https://elibrary.ru/item.asp?id=26191560 (in Russian).
  5. K.E. Izrailov. Utility for vulnerability search in software of telecommunication devices by method algorithmization of machine code. Part 2. Information architecture // Information technologies and telecommunications. 2016. Vol. 4. No. 2. pp. 86-104. // https://elibrary.ru/item.asp?id=27468771 (in Russian).
  6. M.V. Buinevich, K.E. Izrailov. Categorical synthesis and technological analysis of security import substitution variants of telecommunication devices software // Information technologies and telecommunications. 2016. Vol. 4. No. 3. pp. 95-106.// https://elibrary.ru/item.asp?id=28384815 (in Russian).
  7. M.V. Buinevich, K.E. Izrailov, D.I. Mostovich. Comparative analysis of approaches to finding vulnerabilities in software code // In the collection: Actual problems of infotelecommunications in science and education. collection of scientific articles of the V International scientific-technical and scientific-methodical conference. 2016. pp. 256-260. // https://www.elibrary.ru/item.asp?id=27296306 (in Russian).

2015

  1. M.V. Buinevich, O.V. Shcherbakov, A.G. Vladyko, K.E. Izrailov. Architectural vulnerability models of networks // Scientific and Analytical journal "Bulletin of the St. Petersburg University of the State Fire Service of the Ministry of Emergency Situations of Russia". 2015. No. 4. pp. 86-93. // https://elibrary.ru/item.asp?id=25294888 (in Russian).
  2. K.E. Izrailov. Search for vulnerabilities in various representations of machine code // In the book: Information Security of the regions of Russia (IBRR-2015). Conference materials. 2015. p. 157. // https://elibrary.ru/item.asp?id=28771243 (in Russian).

2014

  1. M. Buinevich, K. Izrailov. Method and utility for recovering code algorithms of telecommunication devices for vulnerability search // Â ñáîðíèêå: 16th International Conference on Advanced Communication Technology. 2014. Ñ. 172-176. DOI: 10.1109/ICACT.2014.6778943 // https://elibrary.ru/item.asp?id=26914430
  2. M.V. Buinevich, K.E. Izrailov, O.V. Shcherbakov. Model of machine code specialized for vulnerabilities search // Bulletin of the Voronezh Institute of GPS of the Ministry of Emergency Situations of Russia. 2014. No. 2 (11). pp. 46-51. // https://elibrary.ru/item.asp?id=21574302 (in Russian).
  3. M.V. Buinevich, O.V. Shcherbakov, K.E. Izrailov. Structural model of machine code specialized for search for software vulnerabilities of the automated control systems // Problems of risk management in the technosphere. 2014. No. 3 (31). pp. 68-74. // https://elibrary.ru/item.asp?id=22553713 (in Russian).
  4. K.E. Izrailov. Methods of assessing the effectiveness of medium of algorithmization used to find vulnerabilities // Informatization and Communication. 2014. No. 3. pp. 44-47. // https://elibrary.ru/item.asp?id=22531534 (in Russian).
  5. K.E. Izrailov. Method and software tool for restoring algorithms of machine code of telecommunication devices to search for vulnerabilities // In the collection: Regional informatics "RI-2014". Materials of the XIV St. Petersburg International Conference. 2014. pp. 140-141. // https://elibrary.ru/item.asp?id=28771217 (in Russian).

2013

  1. M.V. Buinevich, K.E. Izrailov. Automated means of algorithmization of machine code of telecommunication devices // Telecommunications. 2013. No. 6. pp. 2-9. // https://elibrary.ru/item.asp?id=19084251 (in Russian).
  2. K.E. Izrailov. Algorithmization machine code of telecommunications devices as a strategic means for information security // National security and strategic planning. 2013. No. 2 (2). pp. 28-36.// https://elibrary.ru/item.asp?id=20234442 (in Russian).
  3. K.E. Izrailov. Analysis of the security state of software // In the collection: Actual problems of infotelecommunications in science and education. II International Scientific-technical and scientific-methodical conference. 2013. pp. 874-877. // https://elibrary.ru/item.asp?id=21939827 (in Russian).
  4. K.E. Izrailov. C-language extensionfor algorithm description of telecommunicationdevices code // Information technologies and telecommunications. 2013. Vol. 1. No. 2. pp. 21-31. // https://elibrary.ru/item.asp?id=21133498 (in Russian).
  5. K.E. Izrailov, A.Yu. Vasilyeva, A.I. Ramazanov. Enlarged assesment method of effectiveness of automated tools, recovering source code in search for vulnerability // Bulletin of the Injecon. Series: Technical Sciences. 2013. No. 8 (67). pp. 107-109.// https://elibrary.ru/item.asp?id=20984314 (in Russian).
  6. K.E. Izrailov. The internal representation of a prototype utility for the recovery code // Fundamental and applied research in the modern world. 2013. No. 2. pp. 79-90.// https://www.elibrary.ru/item.asp?id=20221280 (in Russian).
  7. K.E. Izrailov. Architectural software vulnerabilities // In the book: The Sixth Scientific Congress of Students and postgraduates of INJECON-2013. Abstracts of reports. St. Petersburg State University of Economics; Faculty of Law and Economic Security. 2013. p. 35.// https://www.elibrary.ru/item.asp?id=28771079 (in Russian).

2012

  1. M.V. Buinevich, K.E. Izrailov. Method of algorithmization of machine code of telecommunication devices // Telecommunications. 2012. No. 12. pp. 2-6. // https://elibrary.ru/item.asp?id=20807602 (in Russian).
  2. K. E. Izrailov. Model of forecasting the telecommunication system threats on the basis of the artificial neural network // Bulletin of the Injecon. Series: Technical Sciences. 2012. No. 8 (59). pp. 150-153.// https://www.elibrary.ru/item.asp?id=18244835 (in Russian).
  3. K.E. Izrailov. Consideration of program code representations from the perspective of metadata // In the collection: Fundamental Research and Innovation in national research Universities. Materials of the All-Russian Scientific and Methodological Conference. 2012. pp. 176-180.// https://elibrary.ru/item.asp?id=28772707 (in Russian).
  4. K.E. Izrailov, A.Yu. Vasilyeva. Language of description of the telecommunication network security model // In the collection: New Information technologies and Systems (NITiS-2012). Proceedings of the X International Scientific and Technical Conference. 2012. pp. 272-275. // https://elibrary.ru/item.asp?id=28771694 (in Russian).

Top 

RUSSIA, 199178, Saint-Petersburg, liniya 14-ya, 39, SPC RAS (metro station Vasileostrovskaya).
+7-(812)-328-7181, +7-(812)-328-2642, ivkote[AT]comsec[DOT]spb[DOT]ru

Comments? Questions? chechulin[AT]comsec[DOT]spb[DOT]ru

Locations of visitors to this page