Dennis Gamayunov
Dennis Gamayunov
Verified email at cs.msu.su
TitleCited byYear
Visualization of complex attacks and state of attacked network
A Yelizarov, D Gamayunov
2009 6th International Workshop on Visualization for Cyber Security, 1-9, 2009
262009
Securing mobile devices: malware mitigation methods.
A Skovoroda, D Gamayunov
JoWUA 6 (2), 78-97, 2015
222015
Racewalk: fast instruction frequency analysis and classification for shellcode detection in network flow
D Gamayunov, NTM Quan, F Sakharov, E Toroshchin
2009 European Conference on Computer Network Defense, 4-12, 2009
152009
Adaptive visualization interface that manages user's cognitive load based on interaction characteristics
A Yelizarov, D Gamayunov
Proceedings of the 7th International Symposium on Visual Information, 2014
112014
Review of the mobile malware detection approaches
A Skovoroda, D Gamayunov
2015 23rd Euromicro International Conference on Parallel, Distributed, and, 2015
92015
Network traffic analysis optimization for signature-based intrusion detection systems
DS Kazachkin, DY Gamayunov
Proceedings of the Spring/Summer Young Researchers Colloquium on Software, 2008
62008
Toward network access control with software-defined networking
D Gamayunov, I Platonov, R Smeliansky
Internet: http://www. researchgate. net/profile/Ruslan_Smeliansky, 2013
32013
Hide and seek: Worms digging at the internet backbones and edges
S Gaivoronski, D Gamayunov
Proceedings of the Spring/Summer Young Researchers Colloquium on Software, 2013
32013
Falsifiability of network security research: the good, the bad, and the ugly
D Gamayunov
Proceedings of the 1st ACM SIGPLAN Workshop on Reproducible Research, 2014
22014
Adaptive Security Event Visualization for Continuous Monitoring.
A Yelizarov, D Gamayunov
UMAP Workshops, 2013
22013
Automated static analysis and classification of Android malware using permission and API calls models
A Skovoroda, D Gamayunov
2017 15th Annual Conference on Privacy, Security and Trust (PST), 243-24309, 2017
12017
Towards malware-resistant networking environment
D Gamayunov
2011 First SysSec Workshop, 79-82, 2011
12011
A model of the behavior of network objects in distributed computer systems
DY Gamayunov, RL Smelyanskii
Programming and Computer Software 33 (4), 195-203, 2007
12007
Autonomous Vulnerability Scanning and Patching of Binaries
D Gamayunov, M Voronov, N Lee
Google It, 419-430, 2016
2016
Towards automated web application logic reconstruction for application level security
G Noseevich, D Gamayunov
arXiv preprint arXiv:1511.02564, 2015
2015
,
22 (2), 2015
2015
None Shall Pass: Towards Optimal Network-level Malicious Code Detection and Filtering
S Gaivoronski, D Gamayunov
Demorpheus: Getting Rid Of Polymorphic Shellcodes In Your Network
S Gaivoronski, D Gamayunov
The system can't perform the operation now. Try again later.
Articles 1–18