Elena Doynikova
Elena Doynikova
St. Petersburg Institute for Informatics and Automation of the
Verified email at - Homepage
Cited by
Cited by
Security analysis of information systems taking into account social engineering attacks
I Kotenko, M Stepashkin, E Doynikova
2011 19th International Euromicro Conference on Parallel, Distributed and …, 2011
The ontology of metrics for security evaluation and decision support in SIEM systems
I Kotenko, O Polubelova, I Saenko, E Doynikova
2013 International Conference on Availability, Reliability and Security, 638-645, 2013
Security assessment of computer networks based on attack graphs and security events
I Kotenko, E Doynikova
Information and Communication Technology: Second IFIP TC5/8 International …, 2014
CVSS-based probabilistic risk assessment for cyber situational awareness and countermeasure selection
E Doynikova, I Kotenko
2017 25th Euromicro International Conference on Parallel, Distributed and …, 2017
Choosing models for security metrics visualization
M Kolomeec, G Gonzalez-Granadillo, E Doynikova, A Chechulin, ...
Computer Network Security: 7th International Conference on Mathematical …, 2017
Evaluation of Computer Network Security based on Attack Graphs and Security Event Processing.
IV Kotenko, E Doynikova
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 5 (3), 14-29, 2014
The CAPEC based generator of attack scenarios for network security evaluation
I Kotenko, E Doynikova
2015 IEEE 8th International Conference on Intelligent Data Acquisition and …, 2015
Ontology of metrics for cyber security assessment
E Doynikova, A Fedorchenko, I Kotenko
Proceedings of the 14th International Conference on Availability …, 2019
Dynamical calculation of security metrics for countermeasure selection in computer networks
I Kotenko, E Doynikova
2016 24th Euromicro International Conference on Parallel, Distributed, and …, 2016
Countermeasure selection based on the attack and service dependency graphs for security incident management
E Doynikova, I Kotenko
Risks and Security of Internet and Systems: 10th International Conference …, 2016
Attacker behaviour forecasting using methods of intelligent data analysis: A comparative review and prospects
E Doynikova, E Novikova, I Kotenko
Information 11 (3), 168, 2020
Security metrics based on attack graphs for the Olympic Games scenario
I Kotenko, E Doynikova, A Chechulin
2014 22nd Euromicro International Conference on Parallel, Distributed, and …, 2014
Countermeasure selection in SIEM systems based on the integrated complex of security metrics
I Kotenko, E Doynikova
2015 23rd Euromicro International Conference on Parallel, Distributed, and …, 2015
Selection of countermeasures against network attacks based on dynamical calculation of security metrics
I Kotenko, E Doynikova
The Journal of Defense Modeling and Simulation 15 (2), 181-204, 2018
Attack graph-based countermeasure selection using a stateful return on investment metric
G Gonzalez-Granadillo, E Doynikova, I Kotenko, J Garcia-Alfaro
Foundations and Practice of Security: 10th International Symposium, FPS 2017 …, 2018
An ontology-based storage of security information
I Kotenko, A Fedorchenko, E Doynikova, A Chechulin
Information Technology and Control 47 (4), 655-667, 2018
A semantic model for security evaluation of information systems
E Doynikova, A Fedorchenko, I Kotenko
Journal of Cyber Security and Mobility, 301–330-301–330, 2020
Approach for determination of cyber-attack goals based on the ontology of security metrics
E Doynikova, I Kotenko
IOP Conference Series: Materials Science and Engineering 450 (5), 052006, 2018
Analytical attack modeling and security assessment based on the common vulnerability scoring system
E Doynikova, A Chechulin, I Kotenko
2017 20th Conference of Open Innovations Association (FRUCT), 53-61, 2017
Determination of Young Generation's Sensitivity to the Destructive Stimuli based on the Information in Social Networks.
A Branitskiy, D Levshun, N Krasilnikova, E Doynikova, IV Kotenko, ...
J. Internet Serv. Inf. Secur. 9 (3), 1-20, 2019
The system can't perform the operation now. Try again later.
Articles 1–20