Follow
Maxim Kolomeets
Maxim Kolomeets
Other namesMaxim Kolomeec, Maksim Kalameyets, Максим Коломеец
Verified email at newcastle.ac.uk - Homepage
Title
Cited by
Cited by
Year
Comparative study of machine learning methods for in-vehicle intrusion detection
I Berger, R Rieke, M Kolomeets, A Chechulin, I Kotenko
International Workshop on Security and Privacy Requirements Engineering, 85-101, 2018
552018
Choosing models for security metrics visualization
M Kolomeec, G Gonzalez-Granadillo, E Doynikova, A Chechulin, ...
Computer Network Security: 7th International Conference on Mathematical …, 2017
432017
Обзор методологических примитивов для поэтапного построения модели визуализации данных
МВ Коломеец, АА Чечулин, ИВ Котенко
Информатика и автоматизация 5 (42), 232-257, 2015
342015
Комбинированная методика проектирования защищенных встроенных устройств на примере системы охраны периметра
ВА Десницкий, АА Чечулин, ИВ Котенко, ДС Левшун, МВ Коломеец
Информатика и автоматизация 48 (0), 5-31, 2016
332016
A visual analytics approach for the cyber forensics based on different views of the network traffic.
IV Kotenko, M Kolomeets, A Chechulin, Y Chevalier
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 9 (2), 57-73, 2018
312018
Technique of Data Visualization: Example of Network Topology Display for Security Monitoring.
M Kolomeec, A Chechulin, A Pronoza, IV Kotenko
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 7 (1), 58-78, 2016
302016
Analysis of the malicious bots market
M Kolomeets, A Chechulin
2021 29th conference of open innovations association (FRUCT), 199-205, 2021
242021
Bot detection by friends graph in social networks.
M Kolomeets, A Chechulin, IV Kotenko
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 12 (2), 141-159, 2021
222021
Combined design technique for secure embedded devices exemplified by a perimeter protection system
V Desnitsky, AA Chechulin, IV Kotenko, DS Levshun, MV Kolomeec
Informatics and Automation 48, 5-31, 2016
212016
Application of a technique for secure embedded device design based on combining security components for creation of a perimeter protection system
V Desnitsky, A Chechulin, I Kotenko, D Levshun, M Kolomeec
2016 24th Euromicro International Conference on Parallel, Distributed, and …, 2016
192016
Methodological Primitives for Phased Construction of Data Visualization Models
M Kolomeec, A Chechulin, I Kotenko
Journal of Internet Services and Information Security 5 (4), 60-84, 2015
192015
Camouflaged bot detection using the friend list
M Kolomeets, O Tushkanova, D Levshun, A Chechulin
2021 29th Euromicro international conference on parallel, distributed and …, 2021
162021
Access control visualization using triangular matrices
M Kolomeets, A Chechulin, I Kotenko, I Saenko
2019 27th Euromicro International Conference on Parallel, Distributed and …, 2019
152019
Visualization model for monitoring of computer networks security based on the analogue of voronoi diagrams
M Kolomeets, A Chechulin, I Kotenko
Availability, Reliability, and Security in Information Systems: IFIP WG 8.4 …, 2016
152016
Методика визуализации метрик кибербезопасности
МВ Коломеец, АА Чечулин, ЕВ Дойникова, ИВ Котенко
Известия высших учебных заведений. Приборостроение 61 (10), 873-880, 2018
142018
Complex online harms and the smart home: A scoping review
S Olabode, R Owens, VN Zhang, J Copilah-Ali, M Kolomeets, H Wu, ...
Future Generation Computer Systems, 2023
122023
Cyberattack detection in vehicles using characteristic functions, artificial neural networks, and visual analysis
Y Chevalier, F Fenzl, M Kolomeets, R Rieke, A Chechulin, C Kraus
Информатика и автоматизация 20 (4), 845-868, 2021
112021
Approach to identification and analysis of information sources in social networks
L Vitkova, M Kolomeets
Intelligent Distributed Computing XIII, 285-293, 2020
112020
Social networks analysis by graph algorithms on the example of the VKontakte social network.
M Kolomeets, A Chechulin, IV Kotenko
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 10 (2), 55-75, 2019
112019
Методика визуализации топологии компьютерной сети для мониторинга безопасности
МВ Коломеец, АА Чечулин, ИВ Котенко
Известия высших учебных заведений. Приборостроение 59 (10), 807-812, 2016
112016
The system can't perform the operation now. Try again later.
Articles 1–20