Using graph theory for cloud system security modeling PD Zegzhda, DP Zegzhda, AV Nikolskiy International Conference on Mathematical Methods, Models, and Architectures …, 2012 | 36 | 2012 |
Architecture of a scalable system of fuzzing network protocols on a multiprocessor cluster AI Pechenkin, AV Nikolskiy Automatic Control and Computer Sciences 49 (8), 758-765, 2015 | 8 | 2015 |
Formal security model for virtual machine hypervisors in cloud computing systems DP Zegzhda, AV Nikolsky Minsk: Education and Upbringing, 2014 | 6 | 2014 |
ÔÎÐÌÀËÜÍÀß ÌÎÄÅËÜ ÁÅÇÎÏÀÑÍÎÑÒÈ ÃÈÏÅÐÂÈÇÎÐΠÂÈÐÒÓÀËÜÍÛÕ ÌÀØÈÍ Â ÑÈÑÒÅÌÀÕ ÎÁËÀ×ÍÛÕ ÂÛ×ÈÑËÅÍÈÉ ÄÏ Çåãæäà, À Íèêîëüñêèé Ïðîáëåìû èíôîðìàöèîííîé áåçîïàñíîñòè. Êîìïüþòåðíûå ñèñòåìû, 7-19, 2013 | 6 | 2013 |
Formal model of cyber attacks on virtualization tools and a measure of hypervisor vulnerability AV Nikolskiy, YS Vasil’ev Automatic Control and Computer Sciences 49 (8), 751-757, 2015 | 4 | 2015 |
ÈÑÏÎËÜÇÎÂÀÍÈÅ ÒÅÕÍÎËÎÃÈÈ INTEL SGX ÄËß ÎÁÅÑÏÅ×ÅÍÈß ÊÎÍÔÈÄÅÍÖÈÀËÜÍÎÑÒÈ ÄÀÍÍÛÕ ÏÎËÜÇÎÂÀÒÅËÅÉ ÎÁËÀ×ÍÛÕ ÑÈÑÒÅÌ ÄÏ Çåãæäà, ÅÑ Óñîâ, À Íèêîëüñêèé, ÅÞ Ïàâëåíêî Ïðîáëåìû èíôîðìàöèîííîé áåçîïàñíîñòè. Êîìïüþòåðíûå ñèñòåìû, 50-56, 2016 | 3 | 2016 |
Secure processor architecture modeling for large-scale systems D Moskvin, D Zegzhda, A Nikolskiy Automatic Control and Computer Sciences 49 (8), 684-689, 2015 | 3 | 2015 |
Applying Virtualization Technology for the Construction of Trusted Executable Environment AY Chernov, AS Konoplev, DP Zegzhda Proceedings of the 9th International Conference on Security of Information …, 2016 | 2 | 2016 |
ÔÎÐÌÀËÜÍÀß ÌÎÄÅËÜ ÄËß ÊÈÁÅÐÀÒÀÊ ÍÀ ÑÐÅÄÑÒÂÀ ÂÈÐÒÓÀËÈÇÀÖÈÈ È ÌÅÐÀ ÓßÇÂÈÌÎÑÒÈ ÃÈÏÅÐÂÈÇÎÐΠÀ Íèêîëüñêèé Ïðîáëåìû èíôîðìàöèîííîé áåçîïàñíîñòè. Êîìïüþòåðíûå ñèñòåìû, 40-48, 2013 | 1 | 2013 |
Ìîäåëü óãðîç ãèïåðâèçîðà â ñèñòåìàõ îáëà÷íûõ âû÷èñëåíèé ÄÏ Çåãæäà, À Íèêîëüñêèé Ñèñòåìû âûñîêîé äîñòóïíîñòè 9 (3), 070-078, 2013 | | 2013 |