Подписаться
Maxim Kolomeets
Maxim Kolomeets
Другие именаMaxim Kolomeec, Maksim Kalameyets, Максим Коломеец
Подтвержден адрес электронной почты в домене newcastle.ac.uk - Главная страница
Название
Процитировано
Процитировано
Год
Comparative study of machine learning methods for in-vehicle intrusion detection
I Berger, R Rieke, M Kolomeets, A Chechulin, I Kotenko
International Workshop on Security and Privacy Requirements Engineering, 85-101, 2018
412018
Choosing models for security metrics visualization
M Kolomeec, G Gonzalez-Granadillo, E Doynikova, A Chechulin, ...
Computer Network Security: 7th International Conference on Mathematical …, 2017
392017
Обзор методологических примитивов для поэтапного построения модели визуализации данных
МВ Коломеец, АА Чечулин, ИВ Котенко
Информатика и автоматизация 5 (42), 232-257, 2015
342015
Комбинированная методика проектирования защищенных встроенных устройств на примере системы охраны периметра
ВА Десницкий, АА Чечулин, ИВ Котенко, ДС Левшун, МВ Коломеец
Информатика и автоматизация 48 (0), 5-31, 2016
312016
A visual analytics approach for the cyber forensics based on different views of the network traffic.
IV Kotenko, M Kolomeets, A Chechulin, Y Chevalier
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 9 (2), 57-73, 2018
292018
Technique of Data Visualization: Example of Network Topology Display for Security Monitoring.
M Kolomeec, A Chechulin, A Pronoza, IV Kotenko
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 7 (1), 58-78, 2016
272016
Combined design technique for secure embedded devices exemplified by a perimeter protection system
V Desnitsky, AA Chechulin, IV Kotenko, DS Levshun, MV Kolomeec
Informatics and Automation 48, 5-31, 2016
212016
Analysis of the malicious bots market
M Kolomeets, A Chechulin
2021 29th conference of open innovations association (FRUCT), 199-205, 2021
202021
Application of a technique for secure embedded device design based on combining security components for creation of a perimeter protection system
V Desnitsky, A Chechulin, I Kotenko, D Levshun, M Kolomeec
2016 24th Euromicro International Conference on Parallel, Distributed, and …, 2016
202016
Bot detection by friends graph in social networks.
M Kolomeets, A Chechulin, IV Kotenko
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 12 (2), 141-159, 2021
192021
Methodological Primitives for Phased Construction of Data Visualization Models
M Kolomeec, A Chechulin, I Kotenko
Journal of Internet Services and Information Security 5 (4), 60-84, 2015
182015
Access control visualization using triangular matrices
M Kolomeets, A Chechulin, I Kotenko, I Saenko
2019 27th Euromicro International Conference on Parallel, Distributed and …, 2019
152019
Visualization model for monitoring of computer networks security based on the analogue of voronoi diagrams
M Kolomeets, A Chechulin, I Kotenko
Availability, Reliability, and Security in Information Systems: IFIP WG 8.4 …, 2016
142016
Camouflaged bot detection using the friend list
M Kolomeets, O Tushkanova, D Levshun, A Chechulin
2021 29th Euromicro international conference on parallel, distributed and …, 2021
122021
Методика визуализации метрик кибербезопасности
МВ Коломеец, АА Чечулин, ЕВ Дойникова, ИВ Котенко
Известия высших учебных заведений. Приборостроение 61 (10), 873-880, 2018
122018
Social networks analysis by graph algorithms on the example of the VKontakte social network.
M Kolomeets, A Chechulin, IV Kotenko
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 10 (2), 55-75, 2019
112019
Методика визуализации топологии компьютерной сети для мониторинга безопасности
МВ Коломеец, АА Чечулин, ИВ Котенко
Известия высших учебных заведений. Приборостроение 59 (10), 807-812, 2016
102016
Approach to identification and analysis of information sources in social networks
L Vitkova, M Kolomeets
Intelligent Distributed Computing XIII, 285-293, 2020
92020
Visual analysis of CAN bus traffic injection using radial bar charts
M Kolomeets, A Chechulin, I Kotenko
2018 IEEE Industrial Cyber-Physical Systems (ICPS), 841-846, 2018
92018
Cyberattack detection in vehicles using characteristic functions, artificial neural networks, and visual analysis
Y Chevalier, F Fenzl, M Kolomeets, R Rieke, A Chechulin, C Kraus
Информатика и автоматизация 20 (4), 845-868, 2021
82021
В данный момент система не может выполнить эту операцию. Повторите попытку позднее.
Статьи 1–20