| News | Staff | Projects | Awards | Patents | Results | Conferences | Collaboration | ISL ISoCPS | Publications | Events | Matherials |
 | Links | Contacts |
rus | eng |
  


Personal | Interests |  Courses | Activities |  Awards | Projects | Publications | 

Novikova Evgenia Sergeevna

Citizenship: Russia
Address academic (office):
St.Petersburg Federal Research Ceneter of the Russian Academy of Sciences
39, 14th Liniya, St.-Petersburg, 199178, Russia
Tel.: +7-(812)-328-2642
Fax: +7-(812)-328-4450
E-mail: novikova@comsec.spb.ru

Evgeniia Novikova, senior researcher of Laboratory of Computer Security Problems of the St.Petersburg Federal Research Ceneter of the Russian Academy of Sciences. Graduated with honors from St. Petersburg State Electrotechnical University "LETI" (2007), speciality "Computer Security", received her Ph.D. degree in 2009, speciality "Information Security Methods and Systems, Information Security" (05.13.19).
Main publications are related to the areas of information authentication and protection, digital signature schemes, security visualisation. Author of more than 50 publications, including textbooks.

E-mail: novikova[AT]comsec[DOT]spb[DOT]ru
http://comsec.spb.ru/novikova/

Top 

Research interests

  • Computer network security, including authentication protocols, digital signature schemes, security visualisation

Top 

Courses Taught

The following courses are conducted at the St.Petersburg State Electrotechnical University "LETI":
  • «Computer virology and information system intrusion methods »,
  • «Data structures and data processing algorithms »,
  • «Theory of the cryptography».

Top 

Professional activities

  1. Co-author of several Russian patents.
  2. Serving as PC member of International and Russian conferences: 2012
    • International conference "Mathematical Methods, Models and Architectures for Computer Network Security 2012" (MMM-ACNS-2012). St. Petersburg, Russia. September 11-13, 2012. http://comsec.spb.ru/mmm-acns12/ (PC member).

Top 

Awards

2012

  • Novikova Evgenia Sergeevna - Winner of the competitive selection process for the provision of the 2012 grants to young scientists, young PhD of universities, industry and academic institutions located in St. Petersburg.

2009

  • Novikova Evgenia Sergeevna - Fellowship of the President of Russian Federation for PhD.

2008

  • Novikova Evgenia Sergeevna - The winner of Saint-Petersburg grants for young scientists (Diploma ¹ ÏÑÏ 080157).

Top 

Patents and Programms

Programs and databases

2020

  1. Evgenia Novikova, Vasily Desnitsky Component for the multidimensional data from wireless sensor network visualization. Certificate No. 2020666210. Registered in the Computer Program Registry 07.12.2020.

2013

  1. Evgenia Novikova, Igor Kotenko. System for visualization of logs of mobile money transfer service. Federal Service for Intellectual Property. Certificate No 2013660999. Registered in the Computer Program Registry 26.11.2013 ã.

Top 

Projects

Former Projects

  • Vasiliy Desnitsky (Principal Investigator). “Models, techniques and algorithms for security analysis of software and hardware components of wireless sensor networks”. Research grant # 19-07-00953 A of Russian Foundation of Basic Research, 2019-2021 (Researcher).
    Report-2019-19-07-00953-a-short.pdf [application/pdf] (195496 bytes)
    Report-2020-19-07-00953-a-short.pdf [application/pdf] (201695 bytes)
    Report-2021-19-07-00953-a-short.pdf [application/pdf ] (205488 bytes)
  • Igor Kotenko (Principal Investigator) – State Contract No. 05.607.21.0322 "Development of methods, models, algorithms and software tools based on detecting deviations in heuristics of ultra-high volume traffic to detect network attacks and protect against them". Project of Russian Ministry of Education and Science in scope of the Program "Research and development in priority directions of evolution of the scientific and technological complex of Russia on 2014-2020", 2019-2020 (Researcher).
    Report-FTP-Results-05.607.21.0322.pdf [application/pdf] (204912 bytes)
  • Vasiliy Desnitsky (Principal Investigator). “Development and investigation of models and techniques for design and verification of combined protection mechanisms for information and telecommunication systems with embedded devices on the base of expert knowledge”. Research grant # 14-07-00417-a of Russian Foundation of Basic Research, 2014-2016 (Researcher).
    Report-2014-14-07-00417-a-short.pdf [application/pdf] (258333 bytes)
    Report-2015-14-07-00417-a-short.pdf [application/pdf] (516620 bytes)
    Report-2016-14-07-00417-a-short.pdf [application/pdf] (740843 bytes)
  • Igor Saenko (Principal Investigator). “Models and methods of access to resources in a unified information and communication space of heterogeneous systems based on artificial intelligence technology”. Research grant # 14-07-00697-a of Russian Foundation of Basic Research, 2014-2016 (Researcher).
    Report-2014-14-07-00697-a-short.pdf [application/pdf] (303104 bytes)
    Report-2015-14-07-00697-a-short.pdf [application/pdf] (395000 bytes)
    Report-2016-14-07-00697-a-short.pdf [application/pdf] (614957 bytes)
  • ENGENSEC
    Igor Kotenko (Principal Investigator from SPIIRAS). “Educating the Next generation experts in Cyber Security: the new EU-recognized Master’s program”. Research Project of the European Community program TEMPUS ¹ 544455-TEMPUS-1-2013-1-SE-TEMPUS-JPCR (http://engensec.eu/), 2014-2016 (Researcher).
  • Igor Kotenko (Principal Investigator). “Methods for the synthesis of the distributed intelligent system of information and technological security of automated control systems for railways”. Research grant # 13-07-13159-ofi_m_RJD of Russian Foundation of Basic Research, 2013-2014 (Researcher).
  • Novikova E.S. (Principal Investigator). “Techniques for Security Enforcement of the Authentication Algorithms and Digital Signature Schemes Used in eDocument Flow”. Research Grant ¹12-07-31164-ìîë_à, 2012-2013 (Principal Investigator).
    Report 12-07-31164 2012.pdf [application/pdf] (174674 bytes)
    Report 12-07-31164 2013.pdf [application/pdf] (304058 bytes)
  • Igor Kotenko (Principal Investigator). State Contract No. 11.519.11.4008 “Research and development of methods, models and algorithms of intellectualizing the secirity services in critical infrastructures”. Project of Russian Ministry of Education and Science, 2011-2013 (Researcher).
  • Igor Kotenko (Principal Investigator from SPIIRAS). “MAnagement of Security information and events in Service InFrastructures (MASSIF)”. Research Project of the European Community seventh framework program (FP7). Contract No. 257475 (http://www.massif-project.eu/), 2010-2013 (Researcher).

Top 

Main publications

Books and Chapters in Books

  1. Igor Kotenko, Igor Saenko, Andrey Chechulin, Olga Polubelova, Evgenia Novikova, Elena Doinikova, Andrey Shorov, Vasily Desnitsky. Intelligent information security services in critical infrastructures. Monography / Ed. Igor Kotenko and Igor Sayenko. St. Petersburg: BHV Publishing House, 2019. 400ð. ISBN 978-5-9775-3968-5 https://www.elibrary.ru/item.asp?id=42927796 // https://elibrary.ru/item.asp?id=42927796

Papers

2024

  1. Elena Doynikova, Evgenia Novikova, Alexandr Danilov, Igor Saenko. Towards the Testbed and Dataset for Analysis of Water Treatment Systems Security // Conference: International Conference on Data Science and Applications. 2024. DOI:10.1007/978-981-99-7814-4_37
  2. E.S. Novikova, V.A. Desnitsky. Analysis of visualisation of multidimensional data on the base of glyphs by using chernoff faces // Informatization and communication. 2024. No. 1. pp. 76-83. DOI: 10.34219/2078-8320-2024-15-76-83 // https://www.elibrary.ru/item.asp?id=60028821 (in Russian).
  3. E.S. Novikova, A.V. Meleshko. Methodology for evaluating the effectiveness of intrusion detection system based on federated learning // Informatization and communications. 2024. No. 2. pp. 100-108. DOI: 10.34219/2078-8320-2024-15-2-100-108 // https://www.elibrary.ru/item.asp?id=60775781 (in Russian).

2023

  1. O. Tushkanova, D. Levshun, A. Branitskiy, E. Fedorchenko, E. Novikova, I. Kotenko. Detection of Cyberattacks and Anomalies in Cyber-Physical Systems: Approaches, Data Sources, Evaluation // Algorithms, vol. 16, no. 2, 2023, pp. 85. DOI: 10.3390/a16020085.// https://www.elibrary.ru/item.asp?id=60517408
  2. S.A. Golubev, EE.S. Novikova, E.V. Fedorchenko. Image-Based Approach to Intrusion Detection in Cyber-Physical Objects // MDPI Information, Vol. 13, Issue 12, Art. No. 553 (2022). DOI:10.3390/info13120553
  3. Elena Fedorchenko, Evgenia Novikova, Andrey Fedorchenko, Sergei Verevkin. An Analytical Review of the Source Code Models for Exploit Analysis // Information. 2023. 14, 9. pp. 497. DOI: 10.3390/info14090497
  4. Igor Kotenko, Elena Fedorchenko, Evgenia Novikova, Ashish Jha. Cyber Attacker Profiling for Risk Analysis Based on Machine Learning // Sensors. 2023. 23(4). pp. 2028. DOI: 10.3390/s23042028
  5. Evgenia Novikova, Elena Fedorchenko, Igor Saenko. Methodology for Dataset Generation for Research in Security of Industrial Water Treatment Facilities // 2023 International Russian Automation Conference (RusAutoCon). 2023. pp. 953-958. DOI: 10.1109/RusAutoCon58002.2023.10272930
  6. Sergey Golubev, Evgenia Novikova. Transformation of Network Flow Data into Images for Intrusion Detection Using Convolutional Neural Networks // 2023 International Russian Automation Conference (RusAutoCon). 2023. DOI: 10.1109/RusAutoCon58002.2023.10272890
  7. Elena Fedorchenko, Evgenia Novikova, Igor Saenko. Attack Model for the Industrial Water Treatment Systems // V International Conference on Control in Technical Systems (CTS). 2023. pp. 209-212. DOI: 10.1109/CTS59431.2023.10288930
  8. Evgenia Novikova, Sergey Golubev. Federated Learning Based Approach to Intrusion Detection // V International Conference on Control in Technical Systems (CTS). 2023. DOI: 10.1109/CTS59431.2023.10289088
  9. Sergei Golubev, Evgenia Novikova. Image-Based Intrusion Detection in Network Traffic // Intelligent Distributed Computing XV. Studies in Computational Intelligence. 2023. pp. 51-60. DOI: 10.1007/978-3-031-29104-3_6
  10. Igor Kotenko, Vasily Desnitsky, Evgenia Novikova. Defect Detection in Industrial IoT-based Machines: Case of Small Training Dataset // 2023 IEEE International Conference on Internet of Things and Intelligence Systems (IoTaIS). 2023. DOI: 10.1109/IoTaIS60147.2023.10346064
  11. E.S. Novikova, E.V. Fedorchenko, I.V. Kotenko, I.I. Kholod. Analytical review of intelligent intrusion detection systems based on federated learning: advantages and open challenges // Informatics and Automation. 2023. Vol. 22. No. 5. pp. 1034-1082. DOI: 10.15622/ia.22.5.4 // https://www.elibrary.ru/item.asp?id=54515310 (in Russian).
  12. I.V. Kotenko, E.V. Fedorchenko, E.S. Novikova, I.B. Saenko, A.S Danilov. Data collection methodology for security analysis of industrial cyber-physical systems // Cybersecurity issues. 2023. No. 5 (57). pp. 69-79. DOI: 10.21681/2311-3456-2023-5-69-79 // https://elibrary.ru/item.asp?id=54709889 (in Russian).
  13. E.V. Fedorchenko, E.S. Novikova, I.B. Saenko. Attack model for the industrial water treatment systems // International Scientific Conference on Management Problems in Technical Systems. 2023. Vol. 1. pp. 253-257 // https://elibrary.ru/item.asp?id=54678801 (in Russian).
  14. E.V. Fedorchenko, I.V. Kotenko, A.V. Fedorchenko, E.S. Novikova, I.B. Saenko. Assessment of information system security based on the exploit's graph model // Questions of cybersecurity. 2023. No. 3 (55). pp. 23-36. DOI: 10.21681/2311-3456-2023-3-23-36 // https://www.elibrary.ru/item.asp?id=54303091 (in Russian).
  15. E.S. Novikova, I.V. Kotenko, A.V. Meleshko, k.E. Izrailov. federated learning based intrusion detection: system architecture and experiments // Issues of cybersecurity. 2023. No. 6 (58). pp. 50-66. DOI: 10.21681/2311-3456-2023-6-50-66 // https://elibrary.ru/item.asp?id=54966746 (in Russian).
  16. E.S. Novikova, M.D. Kuznetsov. A method for detecting anomalous activity and violations of security criteria and policies in real time // In the book: Information Security of the regions of Russia (IBRR-2023). XIII St. Petersburg Interregional Conference. Conference materials. St. Petersburg, 2023. pp. 100-102.// https://elibrary.ru/item.asp?id=60024751 (in Russian).
  17. S.A. Golubev, E.S. Novikova. Design of a distributed intrusion detection system based on federated learning // In the book: Information security of the regions of Russia (IBRR-2023). XIII St. Petersburg Interregional Conference. Conference materials. St. Petersburg, 2023. pp. 71-72. // https://elibrary.ru/item.asp?id=60024729 (in Russian).
  18. E.V. Fedorchenko, E.S. Novikova, A.S. Danilov. Designing cyber physical testbed to analyse cyber security // In the book: Information security of the regions of Russia (IBRR-2023). XIII St. Petersburg Interregional Conference. Conference materials. St. Petersburg, 2023. pp. 108-109.// https://elibrary.ru/item.asp?id=60024757 (in Russian).

2022

  1. Elena Doynikova, Evgenia Novikova, Ivan Murenin, Maxim Kolomeec, Diana Gaifulina, Olga Tushkanova, Dmitry Levshun, Alexey Meleshko, Igor Kotenko. Security Measuring System for IoT Devices // Lecture Notes in Computer Science. 2022. Ò. 13106 LNCS. Ñ. 256-275. DOI: 10.1007/978-3-030-95484-0_16 // https://elibrary.ru/item.asp?id=48184836
  2. Evgenia Novikova, Diana Gaifulina, Elena Doynikova, Igor Kotenko. Construction and Analysis of Integral User-Oriented Trustworthiness Metrics // Electronics 2022, 11(2), 234, Ïîðÿäêîâûé íîìåð: 234. DOI: 10.3390/electronics11020234 // https://elibrary.ru/item.asp?id=48142369
  3. M. Kuznetsov, Evgenia Novikova, Igor Kotenko, Elena Doynikova. Privacy policies of iot devices: collection and analysis // Sensors. 2022. Ò. 22. ¹ 5, Ïîðÿäêîâûé íîìåð: 1838 DOI: 10.3390/s22051838 // https://elibrary.ru/item.asp?id=48183588
  4. Evgenia Novikova, Elena Doynikova, S. Golubev S. Federated learning for intrusion detection in the critical infrastructures: vertically partitioned data use case // Algorithms. 2022. Ò. 15. ¹ 4. Ïîðÿäêîâûé íîìåð: 104 DOI: 10.3390/a15040104 // https://elibrary.ru/item.asp?id=48426412
  5. Evgenia Novikova, D Fomichov, I. Kholod, E. Filippov. Analysis of privacy-enhancing technologies in open-source federated learning frameworks for driver activity recognition // Sensors. 2022. Ò. 22. ¹ 8. Ïîðÿäêîâûé íîìåð: 2983
  6. A. Shulepov, Evgenia Novikova, I. Murenin. Approach to anomaly detection in cyber-physical object behavior // Studies in Computational Intelligence. 2022. Ò. 1026. Ñ. 417-426.
  7. Alexey Meleshko, Anton Shulepov, Vasily Desnitsky, Evgenia Novikova. Visualization Assisted Approach to Anomaly and Attack Detection in Water Treatment Systems // Water. 2022. Ò. 14. ¹ 15. Ñ. 2342. DOI: 10.3390/w14152342 // https://elibrary.ru/item.asp?id=56235923
  8. Roman Kryukov, Vladimir Zima, Elena Doynikova, Evgenia Novikova. Mapping the Security Events to the MITRE ATT &CK Attack Patterns to Forecast Attack Propagation (Extended Abstract) // In book: Attacks and Defenses for the Internet-of-Things. 5th International Workshop, Idiot 2022, Copenhagen, Denmark, September 30, 2022, Revised Selected Papers. Lecture Notes in Computer Science, Vol.13745. 2022. Springer, Cham., Vol.13745. P.165-176. DOI:10.1007/978-3-031-21311-3_10
  9. Elena Doynikova, Evgenia Novikova, Anton Shulepov. Comparative review of the intrusion detection systems based on federated learning: advantages and open challenges // Algorithms. 2022. Ò. 15. ¹ 7. Ñ. 247. DOI: 10.3390/a15070247 // https://www.elibrary.ru/item.asp?id=57016209
  10. M. Kuznetsov, Evgenia Novikova, Igor Kotenko. An approach to formal desription of the user notification scenarios in privacy policies // Â ñáîðíèêå: Proceedings - 30th Euromicro International Conference on Parallel, Distributed and Network-Based Processing, PDP 2022. 30. 2022. Ñ. 275-282. DOI: 10.1109/PDP55904.2022.00049 // https://elibrary.ru/item.asp?id=48583376
  11. M. Kuznetsov, Eugenia Novikova. Crawler for the formation of a dataset of user agreements for the use of personal data // Izvestiya SPbGETU LETI. 2022. No. 4. pp. 35-43. (in Russian).
  12. A. Shulepov, Evgenia Novikova. Detection of anomalies in data flows from sensor networks by visual analysis methods // Methods and technical means of ensuring information security. 2022. No. 31. pp. 80-81 // https://elibrary.ru/item.asp?id=48802985 (in Russian).
  13. E.V. Fedorchenko (Doynikova), E.S. Novikova, I.V. Kotenko, D.A. Gayfulina, O.N. Tushkanova, D.S. Levshun, A.V. Meleshko , I.N. Murenin, M.V. Kolomeets. The security and privacy measuring system for the internet of things devices // Cybersecurity issues. 2022. No. 5 (51). pp. 28-46. DOI: 10.21681/2311-3456-2022-5-28-46 // https://elibrary.ru/item.asp?id=50310106 (in Russian).

2021

  1. Doynikova Elena, Novikova Evgenia, Gaifulina Diana, Kotenko Igor. Towards Attacker Attribution for Risk Analysis // Lecture Notes in Computer Science. 2021. Ò. 12528 LNCS. Ñ. 347-353. // DOI:10.1007/978-3-030-68887-5_22 // https://elibrary.ru/item.asp?id=46756437
  2. Tsarenko Olga, Bekeneva Yana, Novikova Evgenia. Analysis of the Messages from Social Network for Emergency Cases Detection //In book: Congress on Intelligent Systems pp.35-47 (Scopus) DOI:10.1007/978-981-33-6984-9_4
  3. I. Kholod, E. Yanaki, D. Fomichev, E. Shalugin, Eugenia Novikova, E. Filippov, M. Nordlund. Open-source federated learning frameworks for IOT: a comparative review and analysis // Sensors. 2021. Ò. 21. ¹ 1. Ñ. 1-22. DOI: 10.3390/s21010167 // https://elibrary.ru/item.asp?id=45041108
  4. Alexey Meleshko, Vasily Desnitsky, Igor Kotenko, Eugenia Novikova, A. Shulepov. Combined approach to anomaly detection in wireless sensor networks on example of water management system // Â ñáîðíèêå: 2021 10th Mediterranean Conference on Embedded Computing, MECO 2021. 10. 2021. Ñ. 9460237. DOI: 10.1109/MECO52532.2021.9460237 https://www.elibrary.ru/item.asp?id=47060214
  5. A. Shulepov, Eugenia Novikova, M. Bestuzhev. Approach to compare point distribution patterns produced by dimension reduction techniques // Â ñáîðíèêå: Proceedings of the 2021 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering, ElConRus 2021. 2021. Ñ. 678-681. DOI: 10.1109/ElConRus51938.2021.9396692 // https://www.elibrary.ru/item.asp?id=46048290
  6. M. Kuznetzov, E. Novikova. Towards application of text mining techniques to the analysis of the privacy policies // Â ñáîðíèêå: 2021 10th Mediterranean Conference on Embedded Computing, MECO 2021. 10. 2021. Ñ. 9460130. DOI: 10.1109/MECO52532.2021.9460130 // https://elibrary.ru/item.asp?id=47038887
  7. Roman Ushakov, Elena Doynikova, Evgenia Novikova, Igor Kotenko. CPE and CVE based Technique for Software Security Risk Assessment //  ñáîðíèêå: Proceedings of the 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, IDAACS 2021. 22-25 September, 2021, Cracow, Poland. pp.353-356 (WoS, Scopus, Ïåðå÷åíü ÂÀÊ, ÐÈÍÖ) DOI:10.1109/IDAACS53288.2021.9660968 // https://elibrary.ru/item.asp?id=48134070
  8. A. Jha, D. Tokarev, E.S. Novikova, E.V. Fedorchenko. Feature selection for attacker attribution in industrial automation & control systems // Proceedings of 2021 IV International Conference on Control in Technical Systems (CTS). IEEE, 2021. Ñ. 220-223. DOI: 10.1109/CTS53513.2021.9562879 // https://www.elibrary.ru/item.asp?id=48153745
  9. E.V. Doynikova, A.V. Fedorchenko, E.S. Novikova, I.A. Ushakov, A.V. Krasov. Security decision support in the control systems based on graph models // Proceedings of 2021 IV International Conference on Control in Technical Systems (CTS). IEEE, 2021. Ñ. 224-227. DOI: 10.1109/CTS53513.2021.9562793 // https://www.elibrary.ru/item.asp?id=48152287
  10. Elena Doynikova, Andrey Fedorchenko, Igor Kotenko, Eugenia Novikova. Security assessment methodology based on the semantic model of metrics and data // Questions of cybersecurity. 2021. No. 1 (41). pp. 29-40. DOI: 10.21681/2311-3456-2021-1-29-40. // https://elibrary.ru/item.asp?id=44833771 (in Russian).
  11. Elena Fedorchenko, Eugenia Novikova, Diana Gayfullina, Igor Kotenko. Attacker profiling based on the network traffic analysis // Control systems, communications and security. 2021. No. 6. pp. 76-89. DOI: 10.24412/2410-9916-2021-6-76-89 // https://elibrary.ru/item.asp?id=47416445 (in Russian).
  12. Alexey Meleshko, Anton Shulepov, Vasily Desnitsky, Eugenia Novikova. Integrated approach to revelation of anomalies in wireless sensor networks for water control cases // Computer tools in education. 2021. No. 1. pp. 58-67. DOI: 10.32603/2071-2340-2021-1-59-68 https://www.elibrary.ru/item.asp?id=47143926 (in Russian).
  13. Michael Kuznetsov, Vladislav Miadzel, Eugenia Novikova. Towards application of text mining techniques to the analysis of the website's online consents // Izvestiya SPbGETU LETI. 2021. No. 4. pp. 42-48. // https://elibrary.ru/item.asp?id=45736640 (in Russian).
  14. Violetta Kiseleva, Eugenia Novikova. Designing a control panel for monitoring the state of a complex object based on a nested design model of data visualization // Izvestiya SPbGETU LETI. 2021. No. 7. pp. 43-49. // https://elibrary.ru/item.asp?id=46566750 (in Russian).
  15. A. Jha, D. Tokarev, Eugenia Novikova, Elena Fedorchenko. Feature selection for attacker attributionin industrial automation & control systems // International Scientific Conference on Management Problems in Technical Systems. 2021. Vol. 1. pp. 273-277. // https://www.elibrary.ru/item.asp?id=46684226 (in Russian).
  16. Elena Doynikova (Fedorchenko), Andrey Fedorchenko, Igor Ushakov, Andrey Krasov, Eugenia Novikova. Decision support for responding to violations in control systems using graph models // International Scientific Conference on Management Problems in Technical Systems. 2021. Vol. 1. pp. 278-282. // https://elibrary.ru/item.asp?id=46684227 (in Russian).
  17. S.A. Golubev, I.N. Murenin, E.S. Novikova. Analysis of approaches to attribute selection for malware analysis based on images // XII St. Petersburg Interregional Conference "Information Security of Russian regions" (IBRR-2021). 2021. T 1. pp. 75-76 http://www.spoisu.ru/files/ibrr/ibrr2021/ibrr2021_materials.pdf (in Russian).
  18. E.V. Fedorchenko, A.V. Fedorchenko, E.S. Novikova, A.A. Branitsky, A.V. Meleshko, V.V. Puchkov. System for security assessment and counermeasure selection using semantic model of data and metrics // XII St. Petersburg Interregional Conference "Information Security of Russian Regions" (IBRR-2021). 2021. 1. pp. 102-103 http://www.spoisu.ru/files/ibrr/ibrr2021/ibrr2021_materials.pdf // https://www.elibrary.ru/item.asp?id=49265505 (in Russian).
  19. E.V. Fedorchenko, E.S. Novikova, D.A. Gayfulina, I.V. Kotenko. Attacker profiling for security analysis and response to cyber incidents // In the collection: Actual problems of protection and security: Proceedings of the XXIV All-Russian Scientific and Practical Conference RARAN (March 31 - April 3, 2021). 2021. Volume 1. pp. 144-148 // https://www.elibrary.ru/item.asp?id=48010763 (in Russian).

2020

  1. Evgenia Novikova, Igor Kotenko, Ivan Murenin. The visual analytics approach for analyzing trajectories of critical infrastructure employers // Energies. 2020. vol. 13. ¹ 15. pp. 3936. DOI: 10.3390/en13153936 (WoS, Scopus) https://www.mdpi.com/1996-1073/13/15/3936 // https://elibrary.ru/item.asp?id=45330905
  2. Elena Doynikova, Evgenia Novikova, Igor Kotenko. Attacker Behaviour Forecasting Using Methods of Intelligent Data Analysis: A Comparative Review and Prospects // Information (Switzerland). 2020. Ò. 11. ¹ 3. Ñ. 168. DOI: 10.3390/INFO11030168 // https://elibrary.ru/item.asp?id=43306145
  3. Evgenia Novikova, Mikhail Bestuzhev, Igor Kotenko. Anomaly Detection in the HVAC System Operation by a RadViz Based Visualization-Driven Approach // Lecture Notes in Computer Science. 2020. Vol 11980 LNCS, pp. 402-418. DOI: 10.1007/978-3-030-42048-2_26 // https://elibrary.ru/item.asp?id=43253565
  4. Evgenia Novikova, Elena Doynikova, Igor Kotenko. P2Onto: Making Privacy Policies Transparent // Lecture Notes in Computer Science. 2020. Ò. 12501 LNCS. Ñ. 235-252. DOI: 10.1007/978-3-030-64330-0_15 // https://elibrary.ru/item.asp?id=45049659
  5. Aleksei Malov, Ivan Kholod, Sergei Rodionov, Evgenia Novikova. Data Mining Algorithms Parallelization in the Framework of Agent-Oriented Programming // International Conference on Next Generation Wired/Wireless Networking Conference on Internet of Things and Smart Spaces // Lecture Notes in Computer Science (cì. â êíèãàõ), volume 12525 LNCS pp.135-147 DOI:10.1007/978-3-030-65726-0_13
  6. Murenin Ivan, Novikova Evgenia, Ushakov Roman, Kholod Ivan. Explaining Android Application Authorship Attribution Based on Source Code Analysis // International Conference on Next Generation Wired/Wireless Networking Conference on Internet of Things and Smart Spaces NEW2AN 2020, ruSMART 2020: Internet of Things, Smart Spaces, and Next Generation Networks and Systems pp 43-56 // Lecture Notes in Computer Science Vol.12525 LNCS DOI:10.1007/978-3-030-65726-0_5 (Scopus, ÐÈÍÖ)
  7. Evgenia Novikova, Mikhail Bestuzhev. Exploration of the Anomalies in HVAC Data Using Image Similarity Assessment // 2020 9th Mediterranean Conference on Embedded Computing (MECO), Budva, Montenegro. P. 9134218 DOI: 10.1109/MECO49872.2020.9134218 // https://elibrary.ru/item.asp?id=45424269
  8. Evgenia Novikova, Polina Belimova, Alena Dzhumagulova, Mikhail Bestuzhe, Yulia Bezbakh, Aleksandr Volosiuk, Andrey Balkanskii, Alexei Lavrov. Usability Assessment of the Visualization-Driven Approaches to the HVAC Data Exploration // 30th International Conference on Computer Graphics and Machine Vision (Gaphicon 2020),Saint Petersburg, September 22-25, 2020. // Ceur Workshop Proceedings. Vol. 2744. pp. 1-12. http://ceur-ws.org/Vol-2744/paper17.pdf // DOI:10.51130/graphicon-2020-2-3-17 // https://elibrary.ru/item.asp?id=45055234
  9. E.S. Novikova, Ya. Bekeneva, M. Bestuzhev. Visual analytics methods for monitoring heterogeneous data flows // News of LETI. 2020. N. 8-9. pp. 52-60. // https://www.elibrary.ru/item.asp?id=44644450 (in Russian).
  10. E.S. Novikova. Application of methods for projecting multidimensional data for the study of data from smart building management systems // Trends in the development of science and education. 2020.¹ 68-1 Ð.66-70 DOI: 10.18411/lj-12-2020-18 // https://www.elibrary.ru/item.asp?id=44503536 (in Russian).
  11. E. V. Doynikova, E. S. Novikova. Forecasting attacker behavior using intelligent data analysis // IX International scientific-technical and scientific-methodological conference " Actual problems of infotelecommunications in science and education "(APINO-2020)". February 26-27, 2020. Collection of scientific articles. 2020. Vol. 1. P. 415-418. // https://www.elibrary.ru/item.asp?id=44604038 (in Russian).
  12. A.V. Kartel, E. S. Novikova, I. N. Murenin, E. V. Doynikova. Defining attributes for malware authorship attributing based on control flow graph analysis // XVII St. Petersburg International Conference " Regional Informatics (RI-2020)". St. Petersburg, October 28-30, 2020, part 1., p. 139-141 http://www.spoisu.ru/files/ri/ri2020/ri2020_materials_1.pdf // https://www.elibrary.ru/item.asp?id=49390758 (in Russian).
  13. I.N. Murenin, E.S. Novikova. Analysis of self-similarity assessment techniques for network traffic of superhigh volumes // XVII St. Petersburg International Conference " Regional Informatics (RI-2020)". St. Petersburg, October 28-30, 2020, part 1., pp. 163-165 http://www.spoisu.ru/files/ri/ri2020/ri2020_materials_1.pdf // https://www.elibrary.ru/item.asp?id=49390600&pff=1 (in Russian).
  14. E. V. Doynikova, E. S. Novikova Response against cyberattacks considering attacker profile // Perspektivnye napravleniya razvitiya otechestvennykh informatsionnykh tekhnologii: materials of the VI interregional scientific and practical conference, Sevastopol, 22-26 Sep. 2020, pp. 203-204. http://www.spoisu.ru/files/pnroit/pnroit-2020_materials.pdf // https://www.elibrary.ru/item.asp?id=45844812 (in Russian).
  15. E.S. Novikova, M.P. Bestuzhev. Definition of the requirements to methods of visual analysis of data streams in real time // Perspective directions of development of domestic information technologies: materials of the VI interregional scientific and practical conference, Sevastopol, September 22-26, 2020, pp. 209-210. http://www.spoisu.ru/files/pnroit/pnroit-2020_materials.pdf // https://www.elibrary.ru/item.asp?id=45844816 (in Russian).
  16. E.S. Novikova, I.N. Murenin. A technique for interpretability of machine learning models in the problem of attributing the software code // Perspective directions of development of domestic information technologies: materials of the VI interregional scientific and practical conference, Sevastopol, September 22-26, 2020, pp. 211-212. http://www.spoisu.ru/files/pnroit/pnroit-2020_materials.pdf // https://www.elibrary.ru/item.asp?id=45844817 (in Russian).
  17. E.V. Doynikova, E.S. Novikova, D.A. Gayfullina, I.V. Kotenko. Defining a set of attributes for forming an attacker's profile when analyzing information security risks // In the book: Regional Informatics (RI-2020). XVII St. Petersburg International Conference. Conference materials. St. Petersburg, 2020. pp. 136-137. // https://www.elibrary.ru/item.asp?id=49390591 (in Russian).

2019

  1. Evgenia Novikova, Igor Kotenko. Visualization-Driven Approach to Fraud Detection in the Mobile Money Transfer Services // In book: Algorithms, Methods, and Applications in Mobile Computing and Communications P .205-236 DOI:10.4018/978-1-5225-5693-0.ch009
  2. Evgenia Novikova, Igor Kotenko. Open challenges in visual analytics for security information and event management // Information & Control Systems. 2019. no. 2. pp. 57-67. DOI: 10.31799/1684-8853-2019-2-57-67 https://cyberleninka.ru/article/n/otkrytye-zadachi-vizualnogo-analiza-v-sistemah-upravleniya-informatsionnoy-bezopasnostyu/viewer // https://elibrary.ru/item.asp?id=41138301 (in Russian).

2017

  1. Evgenia Novikova, Ivan Murenin. Visualization-Driven Approach to Anomaly Detection in the Movement of Critical Infrastructure // Computer Network Security. Lecture Notes in Computer Science, Springer-Verlag. The 2017 7th International Conference on Mathematical Methods, Models and Architectures for Computer Networks Security (MMM-ACNS-2017). August 28-30, 2017, Warsaw, Poland, Vol. 10446 LNCS P.50–61. DOI: 10.1007/978-3-319-65127-9_5. // https://elibrary.ru/item.asp?id=31080040
  2. Evgenia Novikova, Ivan Murenin. The technique of the visual analysis of the organization employees routes for anomaly detection // SPIIRAS Proceedings. No. 5 (54), 2017. P. 57-83. DOI: 10.15622/sp.54.3 // https://elibrary.ru/item.asp?id=30282020 (in Russian).

2016

  1. Evgenia Novikova, Igor Kotenko. Detection of anomalous activity in mobile money transfer services using RADViz-visualization // SPIIRAS Proceedings. 2016. Issue 48. P.32-51. DOI: 10.15622/sp.48.2 // https://elibrary.ru/item.asp?id=27177923 (in Russian).
  2. Evgenia Novikova, Igor Kotenko, Eugene Fedotov. Visual data analysis for anomalies detection in mobile money transfer services // Information Security. Inside, 2016, ¹4(70), P.40-47 https://elibrary.ru/item.asp?id=27035153 (in Russian).
  3. Evgenia Novikova. Generation of the patterns of objects movement in the dynamic environment // Methods and technical means of ensuring information security. 2016. No. 25. pp. 106-108. // https://elibrary.ru/item.asp?id=36546800 (in Russian).
  4. Evgenia Novikova, Igor Kotenko, Eugene Fedotov. Visual data analysis for anomalies detection in mobile money transfer services // Information Security. Inside, 2016, ¹5(71), P.72-82. // https://elibrary.ru/item.asp?id=27035199 (in Russian).

2015

  1. Igor Kotenko, Evgenia Novikova, Andrey Chechulin. Visualization of security metrics for security monitoring and event management. Problems of information security. Computer systems. ¹ 4, 2015. P.42-47. // https://elibrary.ru/item.asp?id=25817956 (in Russian).

2014

  1. Igor Kotenko, Andrey Shorov, Andrey Chechulin, Evgenia Novikova. Dynamical Attack Simulation for Security Information and Event Management // Lecture Notes in Geoinformation and Cartography. 2014. ¹ 199699. Ñ. 219-234. DOI: 10.1007/978-3-642-31833-7_14 // https://elibrary.ru/item.asp?id=30986943
  2. Novikova E., Kotenko I., Fedotov E. Interactive multi-view visualization for fraud detection in mobile money transfer services // International Journal of Mobile Computing and Multimedia Communications. 2014. Vol. 6. ¹ 4. P. 73-97. DOI: 10.4018/IJMCMC.2014100105 // https://elibrary.ru/item.asp?id=27137197
  3. Igor Kotenko, Evgenia Novikova. Visualization of Security Metrics for Cyber Situation Awareness // The 1st International Software Assurance Workshop (SAW 2014). In conjunction with the 9th International Conference on Availability, Reliability and Security (ARES 2014). September 8nd – 12th, 2014. Fribourg, Switzerland. IEEE Computer Society. 2014. P.506-513. DOI: 10.1109/ARES.2014.75 // https://elibrary.ru/item.asp?id=24029278
  4. Evgenia Novikova, Igor Kotenko. Visual Analytics for Detecting Anomalous Activity in Mobile Money Transfer Services // Lecture Notes in Computer Science. 2014. Ò. 8708. Ñ. 63-78. DOI: 10.1007/978-3-319-10975-6_5 // https://elibrary.ru/item.asp?id=41765459
  5. Igor Kotenko, Evgenia Novikova. The models and techniques of a visual data analysis for task solution of the cyber security // 16th Conference “RusCrypto” on Cryptology, Steganography, Digital Signature and Security Systems. Solnechnogorsk, Russia. March 25-28, 2014. http://www.ruscrypto.ru/ (in Russian).
  6. Igor Kotenko, Evgenia Novikova. Visual analytics guard of the information security. International Forum on practical security Positive Hack Days. Moscow. May 21-22, 2014. http://www.phdays.ru (in Russian).

2013

  1. Igor Kotenko, Evgenia Novikova. Vissecanalyzer: a visual analytics tool for network security assessment // Lecture Notes in Computer Science. 2013. Ò. 8128 LNCS. Ñ. 345-360. DOI: 10.1007/978-3-642-40588-4_24 // https://elibrary.ru/item.asp?id=21908848
  2. Igor Kotenko, Evgenia Novikova. Visual analysis of computer network security assessment // Information and Control Systems, 2013, ¹ 3(64). P.55-61. // https://elibrary.ru/item.asp?id=20927233 (in Russian).
  3. Evgenia Novikova, Igor Kotenko. The design of the visualisation subsystem of the SIEM-system// Information Technologies , ¹ 9, 2013.Moscow, New Technology. P.32-36. // https://elibrary.ru/item.asp?id=20270628 (in Russian).
  4. Igor Kotenko, Evgenia Novikova. Visualisation techniques for security information and event management. Issues of Information Protection, ¹ 3(102), 2013. Ð.33-42. // https://elibrary.ru/item.asp?id=20276387 (in Russian).
  5. Evgenia Novikova. Visual Models for Presentation of Information about Network Security. Innovations in Science, ¹ 16-1, 2013. Novosibirsk, SibAK, 2013. Ð.116-120. (in Russian).
  6. Anna Demyanchuk, Dmitri Moldovyan, Evgenia Novikova, Denis Gurianov. An Approach to Digital Sceme Construction Based on Two Difficult Problems. Information and Control Systems, ¹ 2, 2013. Ð.60-66. (in Russian).
  7. Evgenia Novikova. Visualization of the Logs of the Mobile Money Transfer Services For Detecting Fraudster Activity. Proceedings ETU "LETI". 2013. ¹ 4. Ð.44-48. (in Russian).
  8. Evgenia Novikova. Visual analytics technique for analysis of events of the mobile money system// 22th All-Russian Conference “Methods and technical tools of information security”(MTTIS 2013)”. Proceedings. St.Petersburg, Russia. July 08-11, 2013. P.37-39. (in Russian).
  9. Igor Kotenko, Evgenia Novikova. An approach to design of the visual analytical system for security information management on Russian Railways. VIII Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2013)", Saint-Petersburg, October 23-25, 2013. The proceedings of conference, 2013. P.106-107. (in Russian).
  10. Evgenia Novikova. Detection of the anomalous activity in mobile money system using visual analytics techniques. VIII Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2013)", Saint-Petersburg, October 23-25, 2013. The proceedings of conference, 2013. P.120. (in Russian).
  11. Evgenia Novikova , Jana Mondikova. Towards design of practical work "Blind digital signature" for "Criptographical Protocols" course. XIX International Scientific and Practical Conference "Modern education: content, technology, quality". Proceedings. St. Petersburg, Russia. April 24, 2013. P.135-136. (in Russian).
  12. Evgenia Novikova. The usage of interactive technologies in practical works for "Information system intrusion techniques and computer virology" course. XIX International Scientific and Practical Conference "Modern education: content, technology, quality". Proceedings. St. Petersburg, Russia. April 24, 2013. Ñ.178-179. (in Russian).
  13. Anna Demjanchuk, Evgenia Novikova, Dmitrii Moldovyan. An approach for security level enforcement of the zero-knowledge authentication protocols. VIII Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2013)", Saint-Petersburg, October 23-25, 2013. The proceedings of conference, 2013. P.51-52. (in Russian).
  14. Igor Kotenko, Andrey Shorov, Evgenia Novikova. Simulation of protection mechanisms based on "Nervous network system" against infrastructure attacks // Proceedings of the 21th Euromicro International Conference on Parallel, Distributed and network-based Processing (PDP 2013). Belfast, Northern Ireland, UK. 27th February – 1st March 2013. Los Alamitos, California. IEEE Computer Society. 2013. P.526-533. DOI: 10.1109/PDP.2013.85 // https://elibrary.ru/item.asp?id=20428025
  15. Evgenia Novikova, Igor Kotenko. Analytical Visualization Techniques for Security Information and Event Management. Proceedings of the 21th Euromicro International Conference on Parallel, Distributed and network-based Processing (PDP 2013). Belfast, Northern Ireland, UK. 27th February – 1st March 2013. Los Alamitos, California. IEEE Computer Society. 2013. P.519-525. DOI: 10.1109/PDP.2013.84 // https://elibrary.ru/item.asp?id=20427992

2012

  1. Igor Kotenko, Andrey Chechulin, Evgenia Novikova. Attack Modelling and Security Evaluation for Security Information and Event Management. SECRYPT 2012. International Conference on Security and Cryptography. Proceedings. Rome, Italy. 24–27 July 2012. P.391-394. // https://elibrary.ru/item.asp?id=20496746
  2. Evgenia Novikova, Igor Kotenko. Visualization techniques in siem-systems // High availability systems, Vol. 8, ¹ 2, 2012. P.91-99. // https://elibrary.ru/item.asp?id=17997827 (in Russian).
  3. Evgenia Novikova, Igor Kotenko. The analysis of the visualization techniques to ensure the protection of information in computer networks // Proceedings of SPIIRAS. Issue.4 (23). SPb.: Science, 2012. Pp. 7-29.// https://www.elibrary.ru/item.asp?id=18263539 (in Russian).
  4. Evgenia Novikova. The Design of the New Course "Computer Virology and Intrusion Methods Detection" As Renovation of the Basis Course. Proceedings ETU «LETI». 2012. ¹ 4. P.44-48. (in Russian).
  5. Evgenia Novikova. Attack graph visualization techniques. 21th All-Russian Conference "Methods and technical tools of information security" (MTTIS 2012). Proceedings. St.Petersburg, Russia. June 24-29, 2012. P.69-70. (in Russian).
  6. Evgenia Novikova, Chechulin A.A., Igor Kotenko. Visualisation techniques for computer attack counteraction in security information and event management systems. St. Petersburg Scientific Forum "Science and Society". "Science and Mankind Progress". VII St.Petersburg Nobel Prize Laureates Meeting. Proceedings. St.Petersburg, Russia. P.151-152. (in Russian).
  7. Andrey Chechulin, Igor Kotenko, Evgenia Novikova, Elena Doynikova. Attacks and protection mechanisms in the security event and information management. 5th Russian Multiconference on Problems in Control (MPC). Conference on Information Technologies in Control (ITC).Proceedings. St.Petersburg, Russia. October 9–11, 2012. P.735-739. // https://elibrary.ru/item.asp?id=21721925 (in Russian).
  8. Evgenia Novikova. Techniques of the visual analysis for computer network security assessment. XIII Saint-Petersburg International Conference “Regional informatics-2012” (“RI-2012”). Proceedings. St.Petersburg, 2012. P.114. (in Russian).
  9. Evgenia Novikova. Design of the visualization component for security event and information management. XIII Saint-Petersburg International Conference “Regional informatics-2012” (“RI-2012”). Proceedings. St. Petersburg, 2012. Ð.115 (in Russian).
  10. Dmitry Moldovyan, Evgenia Novikova, Alexey Rizhkov, I. Vasiliev. The collective digital signature with message recovery. 65 conference of the teaching stuff of the St. Petersburg State Electrotechnical University, Proceedings. St. Petersburg. Russia. January 24 - February 4, 2012. P.115-119. (in Russian).
  11. Anna Demyanchuk, Dmitry Moldovyan, Evgenia Novikova. Zero knowledge protocols of "request-response" type. All-Army Scientific Conference" Innovations in the Armed Forces of the Russian Federation". Proceedings. St.Petersburg, Russia. November 29-30, 2012. P.144-148. (in Russian).
  12. Evgenia Novikova. Visual models for computer network security analysis. XVII St.Petersburg assembly of young scientists and specialists. Proceedings. October 12, 2012. P.196. (in Russian).
  13. Evgenia Novikova. Education technologies for teaching network intrusion detection providing adaptive mobility of the specialists in computer security. XVIII International Scientific and Practical Conference "Modern education: content, technology, quality". Proceedings. St. Petersburg, Russia. April 18, 2012, Ò.1. P.221-222. (in Russian).
  14. Alexandr Moldovyan, Nikolay Moldovyan, Evgenia Novikova. Blind 384-bit Digital Signature Scheme. Lecture Notes in Computer Science, Springer-Verlag, Vol. 7531. The Sixth International Conference "Mathematical Methods, Models and Architectures for Computer Networks Security" (MMM-ACNS-2012). October 17-19, 2012, St. Petersburg, Russia. P.77-83.

2011

  1. Nikolay Moldovyan, Evgenia Dernova (Novikova), Dmitri Moldovyan. The Functionality Extension of Digital Signature Standards of Russian Federation and Belorus // Information security issues. 2011. No. 2 (93). pp. 8-14. // https://www.elibrary.ru/item.asp?id=16381329 (in Russian).
  2. Dmitri Moldovyan, Evgenia Dernova (Novikova), D. Sukhov. The Functionality Extension of Digital Signature Standards // Information and control systems. 2011. No. 2 (51). pp. 63-67. // https://www.elibrary.ru/item.asp?id=16243999 (in Russian).
  3. Nikolay Moldovyan, Evgenia Dernova (Novikova), Dmitri Moldovyan.The Blind and Collective Digital Signature Protocols based on Standard DSTU 4145-2002 // Information security issues. 2011. No. 2 (93). pp. 14-18. // https://www.elibrary.ru/item.asp?id=16381330 (in Russian).
  4. Roman Kishmar, Petr Moldovyanu, Evgenia Dernova (Novikova), D. Sukhov. The Blind Digital Signature Scheme based on Difficulty of Two Hard Problems. Proceedings ETU "LETI". 2011. ¹ 4. P.44-48 // https://www.elibrary.ru/item.asp?id=16313030 (in Russian).

2010

  1. Dmitri Moldovyan, Evgeniia Dernova (Novikova), Nikolay Moldovyan. Digital Signature Schemes with New Randomization Mechanism. Informatization and Communication. 2010. ¹1. P.66-71. // https://www.elibrary.ru/item.asp?id=15560944 (in Russian).
  2. Lidiya Gortinskaya, Evgenia Dernova (Novikova), Dmitri Moldovyan, Petr Moldovyanu. Construction of the Finite Groups of Vectors for Algorithms of Digital Signature Schemes // News of higher educational institutions. Instrumentation. 2010. Vol. 53. No. 5. pp. 11-16.// https://www.elibrary.ru/item.asp?id=13918072 (in Russian).
  3. Evgenia Dernova (Novikova), Ivan Kupriyanov, Dmitri Moldovyan, Alexandr Moldovyan. Blind Digital Schemes with New Features. Informatization and Communication. 2010. ¹1. P.72-76.// https://www.elibrary.ru/item.asp?id=15560945 (in Russian).

2009

  1. Evgeniia Dernova (Novikova), Anna Kostina, Nikolay Moldovyan, Petr Moldovyanu. Towards Application of Finite Vector Spaces in Cryptography // Radio electronics issues. 2009. Vol. 1. No. 2. pp. 164-174.// https://www.elibrary.ru/item.asp?id=16534648 (in Russian).
  2. Petr Moldovyanu, Dmitri Moldovyan, Evgeniia Dernova (Novikova). Usage of Homomorphy and Multidimensional Cyclicity of Finite Group Vectors in Digital Signature Algorithms. Issues of Information Protection. 2009. ¹ 3(86). P.2-9. // https://www.elibrary.ru/item.asp?id=12865176 (in Russian).
  3. Petr Moldovyanu, Dmitri Moldovyan Evgeniia Dernova (Novikova), Anna Kostina. Homomorphy of Finite Vector Groups and Digital Signature Scheme Design // Information and control systems. 2009. No. 4 (41). pp. 26-32. // https://www.elibrary.ru/item.asp?id=12922852 (in Russian).
  4. Moldovyan P.A., Dernova (Novikova) E.S., Kostina A.A., Moldovyan N.A. Multisignature Protocols and Problem of Simultaneous Signing a Package of Contracts // Springer LNGC. 2009. / 4th Int. Workshop IF&GIS'09 Proc. St.Petersburg, May 17-20, 2009. St. Petersburg, Russia

2008

  1. Evgeniia Dernova (Novikova), Nikolay Moldovyan. Design of Digital Signature Schemes based on Several Hard Problems // Information security issues. 2008. No. 1 (80). pp. 22-27. // https://www.elibrary.ru/item.asp?id=11910801 (in Russian).
  2. Evgeniia Dernova (Novikova), Nikolay Moldovyan. Collective Digital Signature Protocol based on Two Hard Problems // Information technology security. 2008. Vol. 15. No. 2. pp. 79-85. // https://www.elibrary.ru/item.asp?id=18811149 (in Russian).
  3. Evgeniia Dernova (Novikova), Dmitri Moldovyan, Petr Moldovyanu. The construction of the Finite Augmented Field for Cryptographic Applications // Issues of Information Protection. 2008. ¹ 3(82). P.2-7. // https://www.elibrary.ru/item.asp?id=11910825 (in Russian).
  4. Evgeniia Dernova (Novikova), Anna Kostina, Petr Moldovyanu. Using Finite Group of Matrices for Digital Signature Algorithms Construction. Issues of Information Protection. 2008. ¹ 3(82). P.8-12. // https://www.elibrary.ru/item.asp?id=11910826 (in Russian).
  5. Denis Guryanov, Evgeniia Dernova (Novikova), V. Izbash, Dmitri Moldovyan. Algorithms of Digital Signature Based on Difficulty of Rooting Problem in Finite Groups of Known Order // Information and control systems. 2008. No. 5 (36). pp. 33-40.// https://www.elibrary.ru/item.asp?id=11700744 (in Russian).

Top 

RUSSIA, 199178, Saint-Petersburg, liniya 14-ya, 39, SPC RAS (metro station Vasileostrovskaya).
+7-(812)-328-7181, +7-(812)-328-2642, ivkote[AT]comsec[DOT]spb[DOT]ru

Comments? Questions? chechulin[AT]comsec[DOT]spb[DOT]ru

Locations of visitors to this page