BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
EDIT!
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter

Collaborated with:
E.Doynikova I.Saenko A.Chechulin E.Novikova D.Komashinskiy A.Ulanov A.Fedorchenko P.Nesteruk L.Nesteruk A.Shorov M.Stepashkin J.F.Ruiz R.Harjani A.Maña V.Desnitsky
Talks about:
secur (7) system (5) attack (5) base (5) network (3) analysi (3) integr (3) mine (3) algorithm (2) techniqu (2)

Person: Igor V. Kotenko

DBLP DBLP: Kotenko:Igor_V=

Contributed to:

PDP 20152015
PDP 20142014
PDP 20132013
PDP 20122012
PDP 20112011
PDP 20102010
PDP 20092009
PDP 20082008

Wrote 13 papers:

PDP-2015-FedorchenkoKC #analysis #database #design #network #security
Design of Integrated Vulnerabilities Database for Computer Networks Security Analysis (AF, IVK, AC), pp. 559–566.
PDP-2015-KotenkoD #metric #security
Countermeasure Selection in SIEM Systems Based on the Integrated Complex of Security Metrics (IVK, ED), pp. 567–574.
PDP-2014-KotenkoDC #game studies #graph #metric #security
Security Metrics Based on Attack Graphs for the Olympic Games Scenario (IVK, ED, AC), pp. 561–568.
PDP-2014-NesterukNK #adaptation #fuzzy #knowledge base #security
Creation of a Fuzzy Knowledge Base for Adaptive Security Systems (PN, LN, IVK), pp. 574–577.
PDP-2013-KotenkoSN #framework #network #simulation
Simulation of Protection Mechanisms Based on “Nervous Network System” against Infrastructure Attacks (IVK, AS, EN), pp. 526–533.
PDP-2013-NovikovaK #security #visualisation
Analytical Visualization Techniques for Security Information and Event Management (EN, IVK), pp. 519–525.
PDP-2012-RuizHMDKC #analysis #component #embedded #modelling #security
A Methodology for the Analysis and Modeling of Security Threats and Attacks for Systems of Embedded Components (JFR, RH, AM, VD, IVK, AC), pp. 261–268.
PDP-2012-SaenkoK #algorithm #design #evaluation #mining #performance #problem #search-based
Design and Performance Evaluation of Improved Genetic Algorithm for Role Mining Problem (IS, IVK), pp. 269–274.
PDP-2011-KotenkoSD #analysis #information management #security #social
Security Analysis of Information Systems Taking into Account Social Engineering Attacks (IVK, MS, ED), pp. 611–618.
PDP-2011-SaenkoK #algorithm #mining #problem #search-based
Genetic Algorithms for Role Mining Problem (IS, IVK), pp. 646–650.
PDP-2010-KomashinskiyK #data mining #detection #mining
Malware Detection by Data Mining Techniques Based on Positionally Dependent Features (DK, IVK), pp. 617–623.
PDP-2009-Kotenko #detection #framework #network
Framework for Integrated Proactive Network Worm Detection and Response (IVK), pp. 379–386.
PDP-2008-KotenkoU #distributed #internet #simulation
Packet Level Simulation of Cooperative Distributed Defense against Internet Attacks (IVK, AU), pp. 565–572.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.