Folgen
Igor Kotenko
Igor Kotenko
http://comsec.spb.ru/kotenko/
Bestätigte E-Mail-Adresse bei comsec.spb.ru - Startseite
Titel
Zitiert von
Zitiert von
Jahr
A cyber attack modeling and impact assessment framework
I Kotenko, A Chechulin
2013 5th International Conference on Cyber Conflict (CYCON 2013), 1-24, 2013
1862013
Intrusion detection in unlabeled data with quarter-sphere support vector machines
P Laskov, C Schäfer, I Kotenko, KR Müller
Walter de Gruyter GmbH & Co. KG 27 (4), 228-236, 2004
1412004
Attack graph based evaluation of network security
I Kotenko, M Stepashkin
Communications and Multimedia Security: 10th IFIP TC-6 TC-11 International …, 2006
1382006
Attacks against computer network: Formal grammar-based framework and simulation tool
V Gorodetski, I Kotenko
International Workshop on Recent Advances in Intrusion Detection, 219-238, 2002
1342002
Framework for mobile Internet of Things security monitoring based on big data processing and machine learning
I Kotenko, I Saenko, A Branitskiy
IEEE Access 6, 72714-72723, 2018
1002018
Attack modeling and security evaluation in SIEM systems
I Kotenko, A Chechulin
International Transactions on Systems Science and Applications 8, 129-147, 2012
982012
Multi-agent technologies for computer network security: Attack simulation, intrusion detection and intrusion detection learning
V Gorodetski, I Kotenko, O Karsaev
Comput. Syst. Sci. Eng. 18 (4), 191-200, 2003
932003
Agent-based modeling and simulation of cyber-warfare between malefactors and security agents in internet
I Kotenko
19th European Simulation Multiconference “Simulation in wider Europe, 2005
902005
Security analysis of information systems taking into account social engineering attacks
I Kotenko, M Stepashkin, E Doynikova
2011 19th International Euromicro Conference on Parallel, Distributed and …, 2011
822011
A methodology for the analysis and modeling of security threats and attacks for systems of embedded components
JF Ruiz, R Harjani, A Mana, V Desnitsky, I Kotenko, A Chechulin
2012 20th Euromicro International Conference on Parallel, Distributed and …, 2012
802012
Common framework for attack modeling and security evaluation in SIEM systems
I Kotenko, A Chechulin
2012 IEEE International Conference on Green Computing and Communications, 94-101, 2012
782012
Software development kit for multi-agent systems design and implementation
V Gorodetski, O Karsayev, I Kotenko, A Khabalov
International Workshop of Central and Eastern Europe on Multi-Agent Systems …, 2001
722001
Agent-based modeling and simulation of botnets and botnet defense
I Kotenko, A Konovalov, A Shorov
Conference on Cyber Conflict. CCD COE Publications. Tallinn, Estonia, 21-44, 2010
712010
Hybridization of computational intelligence methods for attack detection in computer networks
A Branitskiy, I Kotenko
Journal of Computational Science 23, 145-156, 2017
702017
The ontology of metrics for security evaluation and decision support in SIEM systems
I Kotenko, O Polubelova, I Saenko, E Doynikova
2013 International Conference on Availability, Reliability and Security, 638-645, 2013
702013
Security assessment of computer networks based on attack graphs and security events
I Kotenko, E Doynikova
Information and Communication Technology: Second IFIP TC5/8 International …, 2014
682014
Computer attack modeling and security evaluation based on attack graphs
I Kotenko, A Chechulin
2013 IEEE 7th International Conference on Intelligent Data Acquisition and …, 2013
652013
Malware detection by data mining techniques based on positionally dependent features
D Komashinskiy, I Kotenko
2010 18th Euromicro Conference on Parallel, Distributed and Network-based …, 2010
652010
The ontological approach for SIEM data repository implementation
I Kotenko, O Polubelova, I Saenko
2012 IEEE International Conference on Green Computing and Communications …, 2012
612012
Analytical visualization techniques for security information and event management
E Novikova, I Kotenko
2013 21st Euromicro International Conference on Parallel, Distributed, and …, 2013
602013
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20