Follow
Vasily Desnitsky
Vasily Desnitsky
SPIIRAS
Verified email at comsec.spb.ru - Homepage
Title
Cited by
Cited by
Year
A methodology for the analysis and modeling of security threats and attacks for systems of embedded components
JF Ruiz, R Harjani, A Mana, V Desnitsky, I Kotenko, A Chechulin
2012 20th Euromicro International Conference on Parallel, Distributed and, 2012
712012
Design Technique for Secure Embedded Devices: Application for Creation of Integrated Cyber-Physical Security System.
V Desnitsky, D Levshun, A Chechulin, IV Kotenko
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 7 (2), 60-80, 2016
432016
Detection of anomalies in data for monitoring of security components in the internet of things
VA Desnitsky, IV Kotenko, SB Nogin
2015 XVIII International Conference on Soft Computing and Measurements (SCM, 2015
322015
Expert knowledge based design and verification of secure systems with embedded devices
V Desnitsky, I Kotenko
International Conference on Availability, Reliability, and Security, 194-210, 2014
282014
Configuration-based approach to embedded device security
V Desnitsky, I Kotenko, A Chechulin
International Conference on Mathematical Methods, Models, and Architectures, 2012
282012
Modeling and analysis of IoT energy resource exhaustion attacks
V Desnitsky, I Kotenko
International Symposium on Intelligent and Distributed Computing, 263-270, 2017
212017
Modeling and analysis of security incidents for mobile communication mesh Zigbee-based network
VA Desnitsky, IV Kotenko
2017 XX IEEE International Conference on Soft Computing and Measurements, 2017
212017
Combined design technique for secure embedded devices exemplified by a perimeter protection system
V Desnitsky, AA Chechulin, IV Kotenko, DS Levshun, MV Kolomeec
Informatics and Automation 48, 5-31, 2016
192016
Machine learning based approach to detection of anomalous data from sensors in cyber-physical water supply systems
AV Meleshko, VA Desnitsky, IV Kotenko
IOP conference series: materials science and engineering 709 (3), 033034, 2020
182020
Application of a technique for secure embedded device design based on combining security components for creation of a perimeter protection system
V Desnitsky, A Chechulin, I Kotenko, D Levshun, M Kolomeec
2016 24th Euromicro International Conference on Parallel, Distributed, and, 2016
182016
An approach for network information flow analysis for systems of embedded components
A Chechulin, I Kotenko, V Desnitsky
International Conference on Mathematical Methods, Models, and Architectures, 2012
182012
Security event analysis in XBee-based wireless mesh networks
VA Desnitsky, IV Kotenko
2018 IEEE Conference of Russian Young Researchers in Electrical and, 2018
142018
Monitoring and counteraction to malicious influences in the information space of social networks
I Kotenko, I Saenko, A Chechulin, V Desnitsky, L Vitkova, A Pronoza
International Conference on Social Informatics, 159-167, 2018
132018
Approach to detection of Denial-of-Sleep attacks in wireless sensor networks on the base of machine learning
A Balueva, V Desnitsky, I Ushakov
International Symposium on Intelligent and Distributed Computing, 350-355, 2019
122019
Automated design, verification and testing of secure systems with embedded devices based on elicitation of expert knowledge
V Desnitsky, I Kotenko
Journal of ambient intelligence and humanized computing 7 (5), 705-719, 2016
122016
An abstract model for embedded systems and intruders
V Desnitsky, I Kotenko, A Chechulin
Proceedings-19th International Euromicro Conference on Parallel, Distributed, 2011
122011
Modeling and evaluation of battery depletion attacks on unmanned aerial vehicles in crisis management systems
V Desnitsky, N Rudavin, I Kotenko
International Symposium on Intelligent and Distributed Computing, 323-332, 2019
112019
Protection mechanisms against energy depletion attacks in cyber-physical systems
VA Desnitsky, IV Kotenko, NN Rudavin
2019 IEEE Conference of Russian Young Researchers in Electrical and, 2019
112019
Ensuring availability of wireless mesh networks for crisis management
V Desnitsky, I Kotenko, N Rudavin
International Symposium on Intelligent and Distributed Computing, 344-353, 2018
112018
Neural Network Based Classification of Attacks on Wireless Sensor Networks
VA Desnitsky, IV Kotenko, IB Parashchuk
2020 IEEE Conference of Russian Young Researchers in Electrical and, 2020
82020
The system can't perform the operation now. Try again later.
Articles 1–20