Safe integration of SIEM systems with Internet of Things: Data aggregation, integrity control, and bioinspired safe routing P Zegzhda, D Zegzhda, M Kalinin, A Pechenkin, A Minin, D Lavrova Proceedings of the 9th International Conference on Security of Information …, 2016 | 48 | 2016 |
Applying correlation analysis methods to control flow violation detection in the internet of things D Lavrova, A Pechenkin, V Gluhov Automatic Control and Computer Sciences 49, 735-740, 2015 | 47 | 2015 |
Applying correlation and regression analysis to detect security incidents in the internet of things D Lavrova, A Pechenkin International Journal of Communication Networks and Information Security 7 …, 2015 | 43 | 2015 |
Ontology-based big data approach to automated penetration testing of large-scale heterogeneous systems T Stepanova, A Pechenkin, D Lavrova Proceedings of the 8th International Conference on Security of Information …, 2015 | 40 | 2015 |
Prevention of attacks on dynamic routing in self-organizing adhoc networks using swarm intelligence MO Kalinin, EA Zubkov, AF Suprun, AI Pechenkin Automatic Control and Computer Sciences 52, 977-983, 2018 | 25 | 2018 |
Modeling of information systems to their security evaluation D Zegzhda, P Zegzhda, A Pechenkin, M Poltavtseva Proceedings of the 10th International Conference on Security of Information …, 2017 | 24 | 2017 |
Application model of modern artificial neural network methods for the analysis of information systems security RA Demidov, AI Pechenkin, PD Zegzhda, MO Kalinin Automatic Control and Computer Sciences 52, 965-970, 2018 | 23 | 2018 |
A use case analysis of heterogeneous semistructured objects in information security problems PD Zegzhda, MA Poltavtseva, AI Pechenkin, DS Lavrova, EA Zaitseva Automatic Control and Computer Sciences 52, 918-930, 2018 | 17 | 2018 |
Intelligent data analysis in decision support systems for penetration tests MA Poltavtseva, AI Pechenkin Automatic control and computer sciences 51, 985-991, 2017 | 15 | 2017 |
Applying deep learning and vector representation for software vulnerabilities detection A Pechenkin, R Demidov Proceedings of the 11th International Conference on Security of Information …, 2018 | 13 | 2018 |
Integer overflow vulnerabilities detection in software binary code R Demidov, A Pechenkin, P Zegzhda Proceedings of the 10th International Conference on Security of Information …, 2017 | 8 | 2017 |
Planning of aggregation and normalization of data from the Internet of Things for processing on a multiprocessor cluster MA Poltavtseva, DS Lavrova, AI Pechenkin Automatic Control and Computer Sciences 50, 703-711, 2016 | 8 | 2016 |
An approach to data normalization in the internet of things for security analysis AI Pechenkin, MA Poltavtseva, DS Lavrova Ïðîãðàììíûå ïðîäóêòû è ñèñòåìû, 83-88, 2016 | 8 | 2016 |
Adaptive reflexivity threat protection DS Lavrova, AI Pechenkin Automatic control and computer sciences 49, 727-734, 2015 | 8 | 2015 |
Architecture of a scalable system of fuzzing network protocols on a multiprocessor cluster AI Pechenkin, AV Nikolskiy Automatic Control and Computer Sciences 49, 758-765, 2015 | 8 | 2015 |
Application of deep neural networks for security analysis of digital infrastructure components A Pechenkin, R Demidov SHS Web of Conferences 44, 00068, 2018 | 6 | 2018 |
Modeling the search for vulnerabilities via the fuzzing method using an automation representation of network protocols AI Pechenkin, DS Lavrova Automatic Control and Computer Sciences 49, 826-833, 2015 | 6 | 2015 |
Reflexive control over intruder using deception systems DS Lavrova, EY Pavlenko, AI Pechenkin Nonlinear Phenomena in Complex Systems 17 (3), 263-271, 2014 | 5 | 2014 |
Application of siamese neural networks for fast vulnerability detection in mips executable code R Demidov, A Pechenkin Proceedings of the Future Technologies Conference (FTC) 2019: Volume 2, 454-466, 2020 | 4 | 2020 |
Vector representation of machine instructions for vulnerability assessment of digital infrastructure components R Demidov, A Pechenkin 2018 IEEE Industrial Cyber-Physical Systems (ICPS), 835-840, 2018 | 3 | 2018 |