Choosing models for security metrics visualization M Kolomeec, G Gonzalez-Granadillo, E Doynikova, A Chechulin, ... Computer Network Security: 7th International Conference on Mathematical …, 2017 | 38 | 2017 |
Comparative study of machine learning methods for in-vehicle intrusion detection I Berger, R Rieke, M Kolomeets, A Chechulin, I Kotenko International Workshop on Security and Privacy Requirements Engineering, 85-101, 2018 | 37 | 2018 |
Обзор методологических примитивов для поэтапного построения модели визуализации данных МВ Коломеец, АА Чечулин, ИВ Котенко Информатика и автоматизация 5 (42), 232-257, 2015 | 33 | 2015 |
Комбинированная методика проектирования защищенных встроенных устройств на примере системы охраны периметра ВА Десницкий, АА Чечулин, ИВ Котенко, ДС Левшун, МВ Коломеец Информатика и автоматизация 48 (0), 5-31, 2016 | 30 | 2016 |
A visual analytics approach for the cyber forensics based on different views of the network traffic. IV Kotenko, M Kolomeets, A Chechulin, Y Chevalier J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 9 (2), 57-73, 2018 | 28 | 2018 |
Technique of Data Visualization: Example of Network Topology Display for Security Monitoring. M Kolomeec, A Chechulin, A Pronoza, IV Kotenko J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 7 (1), 58-78, 2016 | 27 | 2016 |
Combined design technique for secure embedded devices exemplified by a perimeter protection system V Desnitsky, AA Chechulin, IV Kotenko, DS Levshun, MV Kolomeec Informatics and Automation 48, 5-31, 2016 | 21 | 2016 |
Application of a technique for secure embedded device design based on combining security components for creation of a perimeter protection system V Desnitsky, A Chechulin, I Kotenko, D Levshun, M Kolomeec 2016 24th Euromicro International Conference on Parallel, Distributed, and …, 2016 | 20 | 2016 |
Analysis of the malicious bots market M Kolomeets, A Chechulin 2021 29th conference of open innovations association (FRUCT), 199-205, 2021 | 18 | 2021 |
Methodological Primitives for Phased Construction of Data Visualization Models M Kolomeec, A Chechulin, I Kotenko Journal of Internet Services and Information Security 5 (4), 60-84, 2015 | 18 | 2015 |
Bot detection by friends graph in social networks. M Kolomeets, A Chechulin, IV Kotenko J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 12 (2), 141-159, 2021 | 17 | 2021 |
Access control visualization using triangular matrices M Kolomeets, A Chechulin, I Kotenko, I Saenko 2019 27th Euromicro International Conference on Parallel, Distributed and …, 2019 | 15 | 2019 |
Visualization model for monitoring of computer networks security based on the analogue of voronoi diagrams M Kolomeets, A Chechulin, I Kotenko Availability, Reliability, and Security in Information Systems: IFIP WG 8.4 …, 2016 | 14 | 2016 |
Camouflaged bot detection using the friend list M Kolomeets, O Tushkanova, D Levshun, A Chechulin 2021 29th Euromicro international conference on parallel, distributed and …, 2021 | 12 | 2021 |
Social networks analysis by graph algorithms on the example of the VKontakte social network. M Kolomeets, A Chechulin, IV Kotenko J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 10 (2), 55-75, 2019 | 11 | 2019 |
Методика визуализации топологии компьютерной сети для мониторинга безопасности МВ Коломеец, АА Чечулин, ИВ Котенко Известия высших учебных заведений. Приборостроение 59 (10), 807-812, 2016 | 10 | 2016 |
Approach to identification and analysis of information sources in social networks L Vitkova, M Kolomeets Intelligent Distributed Computing XIII, 285-293, 2020 | 9 | 2020 |
Visual analysis of CAN bus traffic injection using radial bar charts M Kolomeets, A Chechulin, I Kotenko 2018 IEEE Industrial Cyber-Physical Systems (ICPS), 841-846, 2018 | 9 | 2018 |
Cyberattack detection in vehicles using characteristic functions, artificial neural networks, and visual analysis Y Chevalier, F Fenzl, M Kolomeets, R Rieke, A Chechulin, C Kraus Информатика и автоматизация 20 (4), 845-868, 2021 | 6 | 2021 |
Social networks bot detection using Benford’s law M Kalameyets, D Levshun, S Soloviev, A Chechulin, I Kotenko 13th International Conference on Security of Information and Networks, 1-8, 2020 | 6 | 2020 |