Comparative study of machine learning methods for in-vehicle intrusion detection I Berger, R Rieke, M Kolomeets, A Chechulin, I Kotenko International Workshop on Security and Privacy Requirements Engineering, 85-101, 2018 | 55 | 2018 |
Choosing models for security metrics visualization M Kolomeec, G Gonzalez-Granadillo, E Doynikova, A Chechulin, ... Computer Network Security: 7th International Conference on Mathematical …, 2017 | 43 | 2017 |
Обзор методологических примитивов для поэтапного построения модели визуализации данных МВ Коломеец, АА Чечулин, ИВ Котенко Информатика и автоматизация 5 (42), 232-257, 2015 | 34 | 2015 |
Комбинированная методика проектирования защищенных встроенных устройств на примере системы охраны периметра ВА Десницкий, АА Чечулин, ИВ Котенко, ДС Левшун, МВ Коломеец Информатика и автоматизация 48 (0), 5-31, 2016 | 33 | 2016 |
A visual analytics approach for the cyber forensics based on different views of the network traffic. IV Kotenko, M Kolomeets, A Chechulin, Y Chevalier J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 9 (2), 57-73, 2018 | 31 | 2018 |
Technique of Data Visualization: Example of Network Topology Display for Security Monitoring. M Kolomeec, A Chechulin, A Pronoza, IV Kotenko J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 7 (1), 58-78, 2016 | 30 | 2016 |
Analysis of the malicious bots market M Kolomeets, A Chechulin 2021 29th conference of open innovations association (FRUCT), 199-205, 2021 | 24 | 2021 |
Bot detection by friends graph in social networks. M Kolomeets, A Chechulin, IV Kotenko J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 12 (2), 141-159, 2021 | 22 | 2021 |
Combined design technique for secure embedded devices exemplified by a perimeter protection system V Desnitsky, AA Chechulin, IV Kotenko, DS Levshun, MV Kolomeec Informatics and Automation 48, 5-31, 2016 | 21 | 2016 |
Application of a technique for secure embedded device design based on combining security components for creation of a perimeter protection system V Desnitsky, A Chechulin, I Kotenko, D Levshun, M Kolomeec 2016 24th Euromicro International Conference on Parallel, Distributed, and …, 2016 | 19 | 2016 |
Methodological Primitives for Phased Construction of Data Visualization Models M Kolomeec, A Chechulin, I Kotenko Journal of Internet Services and Information Security 5 (4), 60-84, 2015 | 19 | 2015 |
Camouflaged bot detection using the friend list M Kolomeets, O Tushkanova, D Levshun, A Chechulin 2021 29th Euromicro international conference on parallel, distributed and …, 2021 | 16 | 2021 |
Access control visualization using triangular matrices M Kolomeets, A Chechulin, I Kotenko, I Saenko 2019 27th Euromicro International Conference on Parallel, Distributed and …, 2019 | 15 | 2019 |
Visualization model for monitoring of computer networks security based on the analogue of voronoi diagrams M Kolomeets, A Chechulin, I Kotenko Availability, Reliability, and Security in Information Systems: IFIP WG 8.4 …, 2016 | 15 | 2016 |
Методика визуализации метрик кибербезопасности МВ Коломеец, АА Чечулин, ЕВ Дойникова, ИВ Котенко Известия высших учебных заведений. Приборостроение 61 (10), 873-880, 2018 | 14 | 2018 |
Complex online harms and the smart home: A scoping review S Olabode, R Owens, VN Zhang, J Copilah-Ali, M Kolomeets, H Wu, ... Future Generation Computer Systems, 2023 | 12 | 2023 |
Cyberattack detection in vehicles using characteristic functions, artificial neural networks, and visual analysis Y Chevalier, F Fenzl, M Kolomeets, R Rieke, A Chechulin, C Kraus Информатика и автоматизация 20 (4), 845-868, 2021 | 11 | 2021 |
Approach to identification and analysis of information sources in social networks L Vitkova, M Kolomeets Intelligent Distributed Computing XIII, 285-293, 2020 | 11 | 2020 |
Social networks analysis by graph algorithms on the example of the VKontakte social network. M Kolomeets, A Chechulin, IV Kotenko J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 10 (2), 55-75, 2019 | 11 | 2019 |
Методика визуализации топологии компьютерной сети для мониторинга безопасности МВ Коломеец, АА Чечулин, ИВ Котенко Известия высших учебных заведений. Приборостроение 59 (10), 807-812, 2016 | 11 | 2016 |