Dennis Gamayunov
Dennis Gamayunov
Verified email at
Cited by
Cited by
Visualization of complex attacks and state of attacked network
A Yelizarov, D Gamayunov
2009 6th International Workshop on Visualization for Cyber Security, 1-9, 2009
Securing mobile devices: malware mitigation methods.
A Skovoroda, D Gamayunov
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 6 (2), 78-97, 2015
Racewalk: fast instruction frequency analysis and classification for shellcode detection in network flow
D Gamayunov, NTM Quan, F Sakharov, E Toroshchin
2009 European Conference on Computer Network Defense, 4-12, 2009
Adaptive visualization interface that manages user's cognitive load based on interaction characteristics
A Yelizarov, D Gamayunov
Proceedings of the 7th International Symposium on Visual Information, 2014
Review of the mobile malware detection approaches
A Skovoroda, D Gamayunov
2015 23rd Euromicro International Conference on Parallel, Distributed, and, 2015
Network traffic analysis optimization for signature-based intrusion detection systems
DS Kazachkin, DY Gamayunov
Proceedings of the Spring/Summer Young Researchers Colloquium on Software, 2008
Automated static analysis and classification of Android malware using permission and API calls models
A Skovoroda, D Gamayunov
2017 15th Annual Conference on Privacy, Security and Trust (PST), 243-24309, 2017
Falsifiability of network security research: the good, the bad, and the ugly
D Gamayunov
Proceedings of the 1st ACM SIGPLAN Workshop on Reproducible Research, 2014
Toward network access control with software-defined networking
D Gamayunov, I Platonov, R Smeliansky
Internet: http://www. researchgate. net/profile/Ruslan_Smeliansky, 2013
Hide and seek: Worms digging at the internet backbones and edges
S Gaivoronski, D Gamayunov
Proceedings of the Spring/Summer Young Researchers Colloquium on Software, 2013
Adaptive Security Event Visualization for Continuous Monitoring.
A Yelizarov, D Gamayunov
UMAP Workshops, 2013
Towards malware-resistant networking environment
D Gamayunov
2011 First SysSec Workshop, 79-82, 2011
A model of the behavior of network objects in distributed computer systems
DY Gamayunov, RL Smelyanskii
Programming and Computer Software 33 (4), 195-203, 2007
Autonomous Vulnerability Scanning and Patching of Binaries
D Gamayunov, M Voronov, N Lee
Google It, 419-430, 2016
Towards automated web application logic reconstruction for application level security
G Noseevich, D Gamayunov
arXiv preprint arXiv:1511.02564, 2015
22 (2), 2015
None Shall Pass: Towards Optimal Network-level Malicious Code Detection and Filtering
S Gaivoronski, D Gamayunov
Demorpheus: Getting Rid Of Polymorphic Shellcodes In Your Network
S Gaivoronski, D Gamayunov
The system can't perform the operation now. Try again later.
Articles 1–18