Collaborated with:
E.Doynikova I.Saenko A.Chechulin E.Novikova D.Komashinskiy ∅ A.Ulanov A.Fedorchenko P.Nesteruk L.Nesteruk A.Shorov M.Stepashkin J.F.Ruiz R.Harjani A.Maña V.Desnitsky
Talks about:
secur (7) system (5) attack (5) base (5) network (3) analysi (3) integr (3) mine (3) algorithm (2) techniqu (2)
Person: Igor V. Kotenko
DBLP: Kotenko:Igor_V=
Contributed to:
Wrote 13 papers:
- PDP-2015-FedorchenkoKC #analysis #database #design #network #security
- Design of Integrated Vulnerabilities Database for Computer Networks Security Analysis (AF, IVK, AC), pp. 559–566.
- PDP-2015-KotenkoD #metric #security
- Countermeasure Selection in SIEM Systems Based on the Integrated Complex of Security Metrics (IVK, ED), pp. 567–574.
- PDP-2014-KotenkoDC #game studies #graph #metric #security
- Security Metrics Based on Attack Graphs for the Olympic Games Scenario (IVK, ED, AC), pp. 561–568.
- PDP-2014-NesterukNK #adaptation #fuzzy #knowledge base #security
- Creation of a Fuzzy Knowledge Base for Adaptive Security Systems (PN, LN, IVK), pp. 574–577.
- PDP-2013-KotenkoSN #framework #network #simulation
- Simulation of Protection Mechanisms Based on “Nervous Network System” against Infrastructure Attacks (IVK, AS, EN), pp. 526–533.
- PDP-2013-NovikovaK #security #visualisation
- Analytical Visualization Techniques for Security Information and Event Management (EN, IVK), pp. 519–525.
- PDP-2012-RuizHMDKC #analysis #component #embedded #modelling #security
- A Methodology for the Analysis and Modeling of Security Threats and Attacks for Systems of Embedded Components (JFR, RH, AM, VD, IVK, AC), pp. 261–268.
- PDP-2012-SaenkoK #algorithm #design #evaluation #mining #performance #problem #search-based
- Design and Performance Evaluation of Improved Genetic Algorithm for Role Mining Problem (IS, IVK), pp. 269–274.
- PDP-2011-KotenkoSD #analysis #information management #security #social
- Security Analysis of Information Systems Taking into Account Social Engineering Attacks (IVK, MS, ED), pp. 611–618.
- PDP-2011-SaenkoK #algorithm #mining #problem #search-based
- Genetic Algorithms for Role Mining Problem (IS, IVK), pp. 646–650.
- PDP-2010-KomashinskiyK #data mining #detection #mining
- Malware Detection by Data Mining Techniques Based on Positionally Dependent Features (DK, IVK), pp. 617–623.
- PDP-2009-Kotenko #detection #framework #network
- Framework for Integrated Proactive Network Worm Detection and Response (IVK), pp. 379–386.
- PDP-2008-KotenkoU #distributed #internet #simulation
- Packet Level Simulation of Cooperative Distributed Defense against Internet Attacks (IVK, AU), pp. 565–572.