Follow
Dennis Gamayunov
Dennis Gamayunov
Other namesДенис Юрьевич Гамаюнов, Денис Гамаюнов, Д. Ю. Гамаюнов
Verified email at cs.msu.su
Title
Cited by
Cited by
Year
Visualization of complex attacks and state of attacked network
A Yelizarov, D Gamayunov
2009 6th International Workshop on Visualization for Cyber Security, 1-9, 2009
322009
Securing mobile devices: malware mitigation methods.
A Skovoroda, D Gamayunov
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 6 (2), 78-97, 2015
292015
Adaptive visualization interface that manages user's cognitive load based on interaction characteristics
A Yelizarov, D Gamayunov
Proceedings of the 7th international symposium on visual information …, 2014
242014
Review of the mobile malware detection approaches
A Skovoroda, D Gamayunov
2015 23rd Euromicro International Conference on Parallel, Distributed, and …, 2015
182015
Racewalk: fast instruction frequency analysis and classification for shellcode detection in network flow
D Gamayunov, NTM Quan, F Sakharov, E Toroshchin
2009 European Conference on Computer Network Defense, 4-12, 2009
172009
Automated static analysis and classification of android malware using permission and api calls models
A Skovoroda, D Gamayunov
2017 15th annual conference on privacy, security and trust (PST), 243-24309, 2017
142017
Review of the mobile malware detection approaches: Parallel, Distributed and Network-Based Processing (PDP)
S Anastasia, D Gamayunov
Proc. 2015. IEEE 23rd Euro micro International Conference, 600-603, 2015
102015
Network traffic analysis optimization for signature-based intrusion detection systems
DS Kazachkin, DY Gamayunov
Proceedings of the Spring/Summer Young Researchers’ Colloquium on Software …, 2008
82008
Falsifiability of network security research: The good, the bad, and the ugly
D Gamayunov
Proceedings of the 1st ACM SIGPLAN Workshop on Reproducible Research …, 2014
72014
Adaptive Security Event Visualization for Continuous Monitoring.
A Yelizarov, D Gamayunov
UMAP Workshops, 2013
62013
Toward network access control with software-defined networking
D Gamayunov, I Platonov, R Smeliansky
Internet: http://www. researchgate. net/profile/Ruslan_Smeliansky …, 2013
52013
Hide and seek: worms digging at the Internet backbones and edges
S Gaivoronski, D Gamayunov
Proceedings of the Spring/Summer Young Researchers’ Colloquium on Software …, 2013
32013
Towards malware-resistant networking environment
D Gamayunov
2011 First SysSec Workshop, 79-82, 2011
22011
A model of the behavior of network objects in distributed computer systems
DY Gamayunov, RL Smelyanskii
Programming and Computer Software 33, 195-203, 2007
12007
Dead or alive: Discovering server HTTP endpoints in both reachable and dead client-side code
D Sigalov, D Gamayunov
Journal of Information Security and Applications, 103746, 2024
2024
Finding Server-Side Endpoints with Static Analysis of Client-Side JavaScript
D Sigalov, D Gamayunov
European Symposium on Research in Computer Security, 442-458, 2023
2023
On the applicability and limitations of formal verification of machine learning systems
D Namiot, E Ilyushin, I Chizov, D Gamayunov
Распределенные компьютерные и телекоммуникационные сети: управление …, 2021
2021
GOOGLE IT: TOTAL INFORMATION AWARENESS
D Gamayunov, M Voronov, N Lee
2016
Autonomous Vulnerability Scanning and Patching of Binaries
D Gamayunov, M Voronov, N Lee
Google It: Total Information Awareness, 419-430, 2016
2016
Towards automated web application logic reconstruction for application level security
G Noseevich, D Gamayunov
arXiv preprint arXiv:1511.02564, 2015
2015
The system can't perform the operation now. Try again later.
Articles 1–20