Visualization of complex attacks and state of attacked network A Yelizarov, D Gamayunov 2009 6th International Workshop on Visualization for Cyber Security, 1-9, 2009 | 32 | 2009 |
Securing mobile devices: malware mitigation methods. A Skovoroda, D Gamayunov J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 6 (2), 78-97, 2015 | 29 | 2015 |
Adaptive visualization interface that manages user's cognitive load based on interaction characteristics A Yelizarov, D Gamayunov Proceedings of the 7th international symposium on visual information …, 2014 | 24 | 2014 |
Review of the mobile malware detection approaches A Skovoroda, D Gamayunov 2015 23rd Euromicro International Conference on Parallel, Distributed, and …, 2015 | 18 | 2015 |
Racewalk: fast instruction frequency analysis and classification for shellcode detection in network flow D Gamayunov, NTM Quan, F Sakharov, E Toroshchin 2009 European Conference on Computer Network Defense, 4-12, 2009 | 17 | 2009 |
Automated static analysis and classification of android malware using permission and api calls models A Skovoroda, D Gamayunov 2017 15th annual conference on privacy, security and trust (PST), 243-24309, 2017 | 14 | 2017 |
Review of the mobile malware detection approaches: Parallel, Distributed and Network-Based Processing (PDP) S Anastasia, D Gamayunov Proc. 2015. IEEE 23rd Euro micro International Conference, 600-603, 2015 | 10 | 2015 |
Network traffic analysis optimization for signature-based intrusion detection systems DS Kazachkin, DY Gamayunov Proceedings of the Spring/Summer Young Researchers’ Colloquium on Software …, 2008 | 8 | 2008 |
Falsifiability of network security research: The good, the bad, and the ugly D Gamayunov Proceedings of the 1st ACM SIGPLAN Workshop on Reproducible Research …, 2014 | 7 | 2014 |
Adaptive Security Event Visualization for Continuous Monitoring. A Yelizarov, D Gamayunov UMAP Workshops, 2013 | 6 | 2013 |
Toward network access control with software-defined networking D Gamayunov, I Platonov, R Smeliansky Internet: http://www. researchgate. net/profile/Ruslan_Smeliansky …, 2013 | 5 | 2013 |
Hide and seek: worms digging at the Internet backbones and edges S Gaivoronski, D Gamayunov Proceedings of the Spring/Summer Young Researchers’ Colloquium on Software …, 2013 | 3 | 2013 |
Towards malware-resistant networking environment D Gamayunov 2011 First SysSec Workshop, 79-82, 2011 | 2 | 2011 |
A model of the behavior of network objects in distributed computer systems DY Gamayunov, RL Smelyanskii Programming and Computer Software 33, 195-203, 2007 | 1 | 2007 |
Finding Server-Side Endpoints with Static Analysis of Client-Side JavaScript D Sigalov, D Gamayunov European Symposium on Research in Computer Security, 442-458, 2023 | | 2023 |
On the applicability and limitations of formal verification of machine learning systems D Namiot, E Ilyushin, I Chizov, D Gamayunov Распределенные компьютерные и телекоммуникационные сети: управление …, 2021 | | 2021 |
GOOGLE IT: TOTAL INFORMATION AWARENESS D Gamayunov, M Voronov, N Lee | | 2016 |
Autonomous Vulnerability Scanning and Patching of Binaries D Gamayunov, M Voronov, N Lee Google It: Total Information Awareness, 419-430, 2016 | | 2016 |
Towards automated web application logic reconstruction for application level security G Noseevich, D Gamayunov arXiv preprint arXiv:1511.02564, 2015 | | 2015 |
Обзор методов обнаружения и противодействия вредоносным приложениям для мобильных платформ АА Сковорода, ДЮ Гамаюнов Безопасность информационных технологий 22 (2), 2015 | | 2015 |