Showing
1 - 14
results of
14
for search '
Igor Kotenko
'
Skip to content
Home
High Impact Articles
Search Options
UiTM Open Access
Search by UiTM Scopus
Advanced Search
Search by Category
Discovery Service
Sources
Jawi Collection
UiTM Journals
List UiTM Journal in IR
Statistic
About
Open Access
Creative Commons Licenses
COKI | Malaysia Open Access
Report Technical
User Guide
Contact Us
Search Tips
FAQs
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Tag
Find
Advanced
Author
Igor Kotenko
Showing
1 - 14
results of
14
for search '
Igor Kotenko
'
, query time: 0.36s
Refine Results
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
1
The Framework for Simulation of Bioinspired Security Mechanisms against Network Infrastructure Attacks
by
Andrey Shorov
,
Igor
Kotenko
Published 2014-01-01
Get full text
Article
2
Analysis of the Sensitivity of Algorithms for Assessing the Harmful Information Indicators in the Interests of Cyber-Physical Security
by
Igor
Kotenko
,
Igor Parashchuk
Published 2019-03-01
Get full text
Article
3
The Visual Analytics Approach for Analyzing Trajectories of Critical Infrastructure Employers
by
Evgenia Novikova
,
Igor
Kotenko
,
Ivan Murenin
Published 2020-08-01
Get full text
Article
4
Attacker Behaviour Forecasting Using Methods of Intelligent Data Analysis: A Comparative Review and Prospects
by
Elena Doynikova
,
Evgenia Novikova
,
Igor
Kotenko
Published 2020-03-01
Get full text
Article
5
Analytical attack modeling and security assessment based on the common vulnerability scoring system
by
Elena Doynikova
,
Andrey Chechulin
,
Igor
Kotenko
Published 2017-04-01
Get full text
Article
6
Evaluation of Resource Exhaustion Attacks against Wireless Mobile Devices
by
Vasily Desnitsky
,
Igor
Kotenko
,
Danil Zakoldaev
Published 2019-05-01
Get full text
Article
7
Framework for Mobile Internet of Things Security Monitoring Based on Big Data Processing and Machine Learning
by
Igor
Kotenko
,
Igor Saenko
,
Alexander Branitskiy
Published 2018-01-01
Get full text
Article
8
Determination of System Weaknesses Based on the Analysis of Vulnerability Indexes and the Source Code of Exploits
by
Andrey Fedorchenko
,
Elena Doynikova
,
Igor
Kotenko
Published 2019-09-01
Get full text
Article
9
An Approach to Detecting Cyber Attacks against Smart Power Grids Based on the Analysis of Network Traffic Self-Similarity
by
Igor
Kotenko
,
Igor Saenko
,
Oleg Lauta
,
Aleksander Kribel
Published 2020-09-01
Get full text
Article
10
Increasing the Sensitivity of the Method of Early Detection of Cyber-Attacks in Telecommunication Networks Based on Traffic Analysis by Extreme Filtering
by
Andrey Privalov
,
Vera Lukicheva
,
Igor
Kotenko
,
Igor Saenko
Published 2020-06-01
Get full text
Article
11
Design and Implementation of a Hybrid Ontological-Relational Data Repository for SIEM Systems
by
Igor Saenko
,
Olga Polubelova
,
Andrey Chechulin
,
Igor
Kotenko
Published 2013-07-01
Get full text
Article
12
Methodology for Management of the Protection System of Smart Power Supply Networks in the Context of Cyberattacks
by
Igor
Kotenko
,
Igor Saenko
,
Oleg Lauta
,
Mikhail Karpov
Published 2021-09-01
Get full text
Article
13
An Approach for Stego-Insider Detection Based on a Hybrid NoSQL Database
by
Igor
Kotenko
,
Andrey Krasov
,
Igor Ushakov
,
Konstantin Izrailov
Published 2021-03-01
Get full text
Article
14
Evaluating the Functioning Quality of Data Transmission Networks in the Context of Cyberattacks
by
Andrey Privalov
,
Igor
Kotenko
,
Igor Saenko
,
Natalya Evglevskaya
,
Daniil Titov
Published 2021-08-01
Get full text
Article
Search Tools:
Get RSS Feed
—
Email this Search
Loading...