| News | Staff | Projects | Awards | Patents | Results | Conferences | Collaboration | ISL ISoCPS | Publications | Events | Matherials |
 | Links | Contacts |
rus | eng |
  


Personal | Interests |  Membership | Activities |  Awards |  Patents and Programms |  Projects | Publications | Identifiers | 

Chechulin Andrey Alexeevich

Citizenship: Russia
Address academic (office):
St.Petersburg Federal Research Ceneter of the Russian Academy of Sciences
39, 14th Liniya, St.-Petersburg, 199178, Russia
Tel.: +7-(812)-328-7181
Fax: +7-(812)-328-4450

Position:Leading research fellow

Associate professor, Dr. Andrey Alexeevich Chechulin, leading research fellow of Laboratory of Computer Security Problems of the St.Petersburg Federal Research Ceneter of the Russian Academy of Sciences.

E-mail: chechulin[AT]comsec[DOT]spb[DOT]ru
http://comsec.spb.ru/chechulin/

Top 

Research interests

Computer network security, intrusion detection, analysis of vulnerability, security visualization, embedded systems security

Top 

Academic background

  • 1997-1999 the Saint-Petersburg Physico-Mathematical Lyceum (FML) ¹239
  • 1999-2005 the St.-Petersburg State Polytechnical University, Faculty of Technical Cybernetics, faculty "Information Safety of Computer Networks"
  • 2003 the degree of the bachelor in a direction "Computer science and computer facilities" is appropriated.
  • 2005 the degree of the master in a direction "Computer science and computer facilities", specialization - 552825 "Safety and protection of the information" is appropriated.
  • 2013 the degree of the PhD in a speciality "Information Security Methods and Systems, Information Security" (05.13.19) is appropriated.

Additional education

  • 2021 - advanced training on the program "Technologies of modern Wi-Fi networks" in the Bonch-Bruevich Saint-Petersburg State University of Telecommunications. Certificate ¹7827 006159, registration number ¹1350, Saint-Petersburg, 07.12.2021

  • 2021 - advanced training on the program "Protection of cloud computing and telecommunications" in the Bonch-Bruevich Saint-Petersburg State University of Telecommunications. Certificate ¹7827 00615273, registration number ¹0732, Saint-Petersburg, 07.07.2021

  • 2018 - advanced training on the program "English as a Medium of Instruction (EMI) Teacher Training" in the St. Petersburg National Research University of Information Technologies, Mechanics and Optics. Certificate ¹7824 08407340, registration number ¹888-3561, Saint-Petersburg, 18.12.2018.

  • 2018 - advanced training on the program "Information and communication technologies in the educational process and information educational environment" in the Bonch-Bruevich Saint-Petersburg State University of Telecommunications. Certificate ¹7827 00202384, registration number ¹0673, Saint-Petersburg, 03.10.2018.

  • 2018 - advanced training on the program "Protection of cloud computing and telecommunications" in the Bonch-Bruevich Saint-Petersburg State University of Telecommunications. Certificate ¹7827 00108737, registration number ¹0161, Saint-Petersburg, 26.04.2018

  • 2017 - advanced training on the program "Development of professional competencies in the field of modern information technologies" in the Southern Federal University (SFedU). Certificate ¹612405994054, registration number ¹705.15.01-35/267, Rostov-na-Donu, 29.11.2017

  • 2016 - training sessions: Pentest & Ethical Hacking. These session was held as a part of ENGENSEC programme in the Bonch-Bruevich Saint-Petersburg State University of Telecommunications.

  • 2015 - training sessions: Project Management, Teachers Training for the Digital Forensic. These sessions were held as a part of ENGENSEC programme in the Federal Criminal Police Office of Germany.

  • 2014 - training sessions: Train-the-Trainer, Project Management, Intercultural Competence, Introduction to Distant Learning Systems. These sessions were held as a part of ENGENSEC programme in the Federal Criminal Police Office of Germany.

Top 

Membership in International Societies

Member of
  • St Petersburg Association of Scientists and Scholars (SPASS)
  • International scientific, engineering and educational organization dedicated to advancing the arts, sciences and applications of Information Technology and Microelectronics (Euromicro)

Top 

Identifiers

Top 

Professional activities

Project and funds:
  • Since 2015 is a member of Review board of Russian Science Foundation (http://rscf.ru/en).
  • Since 2018 is a member of Advisory board of "Cybersecurity Awareness and Knowledge Systemic High-level Application (YAKSHA)" project, funded under the European Union's Horizon 2020 research and innovation programme. http://project-yaksha.eu, 2018-2020.

Serving as PC member of International and Russian conferences:

2019

  • The 27rd International Euromicro Conference on Parallel, Distributed and Network-based Processing (PDP 2019). Pavia, Italy. February 13-15, 2018. http://www.pdp2019.org (PC Member).

2018

  • The 2018 International Symposium on Mobile Internet Security (MobiSec 2018). Cebu, Philippines. August 29-September 1, 2018. http://isyou.info/conf/mobisec18 (PC Member).
  • The Fourth International scientific school "Incident management and countering targeted cyber-physical attacks in distributed large-scale critical systems" (IMCTCPA'2017). St.Petersburg, Russia. 2018. http://www.comsec.spb.ru/imctcpa18/ (PC and OC Member).
  • The 1st IEEE International Conference on Industrial Cyber-Physical Systems (ICPS-2018). St.Petersburg, Russia. May 15-18, 2018. http://icps2018.net/ (PC Member).
  • The 26rd International Euromicro Conference on Parallel, Distributed and Network-based Processing (PDP 2018). Cambridge, UK. March 21-23, 2018. http://www.pdp2018.org (PC Member).

2017

  • The Third International scientific school "Incident management and countering targeted cyber-physical attacks in distributed large-scale critical systems" (IMCTCPA'2017). St.Petersburg, Russia. December, 18-21 2017. http://www.comsec.spb.ru/imctcpa17/ (PC and OC Member).
  • The 2017 International Symposium on Mobile Internet Security (MobiSec 2017). Jeju City, South Korea. October 19-22, 2017. http://isyou.info/conf/mobisec17 (PC Member).
  • The 25rd International Euromicro Conference on Parallel, Distributed and Network-based Processing (PDP 2017). St. Petersburg, Russia. March 6-8, 2017. http://www.pdp2017.org (PC and OC Member).

2016

  • The Second International scientific school "Incident management and countering targeted cyber-physical attacks in distributed large-scale critical systems" (IMCTCPA'2016). St.Petersburg, Russia. October, 31 - November, 02, 2016. http://www.comsec.spb.ru/imctcpa16/ (PC and OC Member).
  • The 2016 International Symposium on Mobile Internet Security (MobiSec 2016). Taichung, Taiwan. July 14-15, 2016. http://isyou.info/conf/mobisec16/ (PC Member).
  • The 13th International Symposium on Neural Networks (ISNN 2016). St.Petersburg, Russia. July 6-8, 2016. http://conference.cs.cityu.edu.hk/isnn/ (PC Member).
  • The 24rd International Euromicro Conference on Parallel, Distributed and Network-based Processing (PDP 2016). Heraklion Crete, Greece. February 17-19, 2016. http://www.pdp2016.org (PC Member).

2015

  • The Special Issue of Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA). Republic of Korea. http://jowua.yolasite.com (PC Member).
  • The 23rd International Euromicro Conference on Parallel, Distributed and Network-based Processing (PDP 2015). Turku, Finland. March 4-6, 2015. http://www.pdp2015.org (PC Member).
  • The International scientific school "Incident management and countering targeted cyber-physical attacks in distributed large-scale critical systems" (IMCTCPA'2015). St.Petersburg, Russia. November, 26-28, 2015. http://www.comsec.spb.ru/imctcpa15/ (PC and OC Member).

2014

2013

Top 

Courses Taught

Since 2015 is an assistant professor of Secure Communication Systems (ZSS) department at the Bonch-Bruevich Saint-Petersburg State University of Telecommunications (SPbGUT). He is the supervisor of bachelor and master students. He teaches following courses:
  • Firewalling (2015/2016)
  • Basics of Information Security in Telecommunication Networks (2015/2017)
  • Computer Networks Security (2016/2017)
  • Digital Forensic in English (2016/2017, 2017/2018)
  • Information Security Technologies (2017/2018, 2018/2019)
  • Basics of Routing in Computer Networks (2017/2018)
  • Advanced Network and Cloud Security in English (2017/2018)
  • Big Data Security (2018/2019)
  • Digital Forensic (2018/2019)
Participated in the development of a course "Digital Forensic" reg. ¹02.34.14/1092 from 06.11.2015, the authors Andrey Chechulin and Igor Ushakov for master students of 10.04.01 "Information security" program.

Since 2016, he is the scientific supervisor of students at the St. Petersburg State Electrotechnical University "LETI" named after VI Ulyanov (Lenin) - ETO LETI

Since 2017 he is the scientific supervisor of master and PhD students at the St. Petersburg State National University of Information Technologies, Mechanics and Optics - ITMO University

Top 

Students


Students (supervisor or adviser): PhD Students (supervisor or adviser):
  • Levshun Dmitry Sergeevich - “Mathematical models, methods and algorithms of integrated security monitoring of distributed cyber-physical systems based on microcontrollers ” (adviser);
  • Kolomeec Maxim Vadimovich - “Mathematical models, techniques and algorithms for cyber security state visualization based on the integration of virtual and augmented reality technologies, their verification and certification” (supervisor);
  • Bakhtin Urii Evgenievich - “Mathematical models, techniques and algorithms for information security incident analysis for railway transport systems” (supervisor).
  • Zhernova Ksenia Nikolaevna - “Models, methods, methods and algorithms of human-machine interaction for visual analytics of network security using multi-touch touch screens” (supervisor).

Top 

Awards

2021

  • Chechulin Andrey Alexeevich - Certificate of acknowledgement from the Ministry of Science and Higher Education of the Russian Federation for a significant contribution to the development of the scientific field and conscientious work. Order dated June 7, 2021 No. 152 k/p.

2019

  • Chechulin Andrey Alexeevich - 1st place in the section "Transport Systems" at the III International Scientific Conference "Science of the Future" for the project "Self-learning hardware and software robotic complex for emergency situations".

2017

  • Chechulin Andrey Alexeevich - Winner of the "Automotive Village: CarPWN" competition in the Positive Hack Days conference VII (http://phdays.ru). The second place.

  • Chechulin Andrey Alexeevich - The winner of the competition for the right to obtain grants from the President of the Russian Federation for state support of young Russian scientists - candidates of science in the field of knowledge "Information and telecommunication systems and technologies". Project title: "Methods, models and algorithms for the construction and usage of a hybrid data warehouse for analytical processing of the information and security events". Certificate ¹ MK-314.2017.9.

  • Chechulin Andrey Alexeevich - Winner of the St. Petersburg competitive selection for young scientists and PhD. Project title: "Development of the models and software components for network security state visualization based on visulzaition models combination".

  • Chechulin Andrey Alexeevich - 2rd place award in the Jubilee competition for the best scientific paper among young scientists and specialists of SPIIRAS in 2017.

2016

  • Chechulin Andrey Alexeevich - Dmitry Levshun and Andrey Chechulin are laureates of the best paper award at LXIII International Theoretical and Practical Conference "Innovations in Science", Novosibirsk, Russia.

2015

  • Chechulin Andrey Alexeevich - Awarded the Medal of the Russian Academy of Science in area of Computer Science, Computer Engineering and Automation (Decree of the Presidium of RAS ¹ 24 dated 17.02.2015).

  • Chechulin Andrey Alexeevich - Winner of the St. Petersburg competitive selection for young scientists and PhD. Project title: "Models and methods development for protection against unwanted and harmful information on the Internet". Diplom: series PSP ¹ 15854.

2014

  • Chechulin Andrey Alexeevich - The winner of the competitive selection for the grants of St. Petersburg in the area of scientific and technical activities. Competition organizer: Committee on Science and Higher Education of St. Petersburg. Project title: "Development of advanced malefactor detection system based on analytical modeling techniques for computer networks". Agreement ¹185-14 from 15.10.2014.
  • Chechulin Andrey Alexeevich - Winner of the "Insane home" competition in the Positive Hack Days conference IV (http://phdays.ru). The first place.

2013

  • Chechulin Andrey Alexeevich - Winner of the Young School competition in the Positive Hack Days III conference (http://phdays.ru). The second place. Presentation topic: "Construction of Attack Graphs for Security Events Analysis".

      

2012

  • Chechulin Andrey Alexeevich - Winner of the competitive selection process for the provision of the 2012 grants to young scientists, young PhD of universities, industry and academic institutions located in St. Petersburg. Competition organizer: Committee on Science and Higher Education of St. Petersburg. Project title: "Development of Advanced Intrusion Detection System".

Top 

Patents and Programms

Patents for inventions and utility models, applications for them

  1. Vasily Desnitsky, Elena Doynikova, Igor Kotenko, Igor Parashchuk, Igor Saenko, Andrey Chechulin. Information retrieval device. Patent No. 2792840. Registered in the State Register of Inventions of the Russian Federation on 27.03.2023. The validity period of the exclusive right to the invention expires on 30.11.2042.
  2. Vasily Desnitsky, Elena Doynikova, Igor Kotenko, Igor Parashchuk, Igor Saenko, Andrey Chechulin. Device for network traffic. Patent No. 2768543. Registered in the State Register of Inventions of the Russian Federation on 24.03.2022. The validity period of the exclusive right to the invention expires on 07.04.2041.
  3. Vasily Desnitsky, Elena Doynikova, Igor Kotenko, Igor Parashchuk, Igor Saenko, Andrey Chechulin. Device for parametric estimation of the distribution law of message streams. Patent No. 2750287. Registered in the State Register of Inventions of the Russian Federation on 25.06.2021. The validity period of the exclusive right to the invention expires on 11.07.2040.
  4. Vasily Desnitsky, Igor Kotenko, Igor Parashchuk, Igor Saenko, Andrey Chechulin, Elena Doynikova. Information retrieval device. Patent No. 2724788. Registered in the State Register of Inventions of the Russian Federation on 25.06.2020. The validity period of the exclusive right to the invention expires on 14.10.2039.

  5. Vasily Desnitsky, Igor Kotenko, Igor Parashchuk, Igor Saenko, Andrey Chechulin. Random event prediction device. Patent No. 2705010. Registered in the State Register of Inventions of the Russian Federation on 01.11.2019. The validity period of the exclusive right to the invention expires on 14.02.2039.

  6. Vasily Desnitsky, Igor Kotenko, Igor Parashchuk, Igor Saenko, Andrey Chechulin. Information retrieval device. Patent No. 2656736. Registered in the State Register of Inventions of the Russian Federation on 06.06.2018. The validity period of the exclusive right to the invention expires on 27.06.2037.

Programs and databases

2021

  1. Maxim Kolomeec, Andrey Chechulin, Igor Kotenko. Decision support component for the countermeasures selection for malicious influence on social networks. Certificate No. 2021617410. Registered in the Computer Program Registry 14.05.2021.
  2. Lidia Vitkova, Andrey Chechulin. Information sources analysis and evaluation component for social networks. Certificate No. 2021617407. Registered in the Computer Program Registry 14.05.2021.
  3. Aleksei Pronichev, Andrey Chechulin. Integration component for social network data collection systems. Certificate No. 2021617409. Registered in the Computer Program Registry 14.05.2021.

2020

  1. Vasily Desnitsky, Igor Parashchuk, Andrey Chechulin. The component of eliminating the estimation uncertainty and categorization of the semantic content of information objects based on the disjoint summation of fuzzy sets. Certificate No. 2020610922. Registered in the Computer Program Registry 22.01.2020.

  2. Maxim Kolomeec, Andrey Chechulin. Pie chart implementation component for displaying data in virtual and augmented reality. Certificate No 2020660482. Program Registry 04.09.2020.

  3. Aleksei Pronichev, Andrey Chechulin. Rail Transport Infrastructure Modeling System Component. Certificate No 2020660922. Program Registry 15.09.2020.

  4. Andrey Chechulin, Igor Kotenko, Ksenia Zhernova. A component for detecting multi-step network attacks based on analytical modeling. Certificate No 2020660703. Program Registry 10.09.2020.

  5. Maxim Kolomeets, Andrey Chechulin, Igor Kotenko Software tool which implements visual interfaces for detection and counteraction of inappropriate, dubious and harmful information. Certificate No. 2020665787. Registered in the Computer Program Registry 01.12.2020.

  6. Dmitry Levshun, Andrey Chechulin Component for the gathering of the quantitative data about users of the Vkontakte social network. Certificate No. 2020665860. Registered in the Computer Program Registry 01.12.2020.

  7. Dmitry Levshun, Andrey Chechulin Component for the news gathering from the Vkontakte social network. Certificate No. 2020665466. Registered in the Computer Program Registry 27.11.2020.

  8. Anton Pronoza, Andrey Chechulin, Igor Kotenko Component for the community analysis in a social network. Certificate No. 2020665856. Registered in the Computer Program Registry 01.12.2020.

  9. Olga Tushkanova, Andrey Chechulin Component for the classification of social network posts. Certificate No. 2020666209. Registered in the Computer Program Registry 07.12.2020.

2019

  1. Dmitry Levshun, Andrey Chechulin. The component for comments collection in the VKontakte social network. Certificate No 2019663976. Registered in the Computer Program Registry 29.10.2019.

  2. Dmitry Levshun, Andrey Chechulin, Igor Kotenko. Application for the analysis of the constructive, destructive and deficit components of the user's I-functions based on Ammon’s I-structural test. Certificate No 2019664059. Registered in the Computer Program Registry 30.10.2019.

  3. Maxim Kolomeets, Andrey Chechulin, Ksenia Zhernova. The system for the evaluation of user's visual perception in virtual reality. Certificate No 2019664065. Registered in the Computer Program Registry 30.10.2019.

  4. Maxim Kolomeets, Andrey Chechulin. Component for visualization of graph structures in virtual reality. Certificate No 2019664066. Registered in the Computer Program Registry 30.10.2019.

  5. Maxim Kolomeets, Andrey Chechulin. The search component of the connected core of social groups in social networks. Certificate No 2019664067. Registered in the Computer Program Registry 30.10.2019.

  6. Dmitry Levshun, Andrey Chechulin. The visualization component for the results of a psychological tests based on Ammon's I-structural test. Certificate No 2019664301. Registered in the Computer Program Registry 05.11.2019.

  7. Maxim Kolomeets, Andrey Chechulin. Component for visual analysis of social network user activity in 2D and 3D. Certificate No 2019664309. Registered in the Computer Program Registry 05.11.2019.

  8. Lidia Vitkova, Andrey Chechulin, Igor Kotenko. A component of user segmentation by their activity on social networks. Certificate No. 2019664733. Registered in the Register of computer programs on 13.11.2018.

2018

  1. Alexander Branitskiy, Maxim Kolomeec, Andrey Chechulin. Network visualization system based on Voroni diagramm. Federal Service for Intellectual Property. Certificate No 2018613605. Registered in the Computer Program Registry 19.03.2018.

  2. Alexey Zhuvikin, Lidia Vitkova, Andrey Chechulin, Yulia Soldatova. Monitoring of graphic images in the global Internet. Federal Service for Intellectual Property. Certificate No 2018662641. Registered in the Computer Program Registry 12.10.2018.

  3. Vasily Desnitsky, Andrey Chechulin. Firmware of a node of a Smart City sensor network to model energy exhaustion attacks. Federal Service for Intellectual Property. Certificate No 2018662696. Registered in the Computer Program Registry 12.10.2018.

  4. Vasily Desnitsky, Andrey Chechulin. Detection of energy exhaustion attacks on the base of rules in wireless mesh networks. Federal Service for Intellectual Property. Certificate No 2018662817. Registered in the Computer Program Registry 16.10.2018.

  5. Vasily Desnitsky, Andrey Chechulin. Control for governing an unmanned aerial vehicle to model energy exhaustion attacks . Federal Service for Intellectual Property. Certificate No 2018662871. Registered in the Computer Program Registry 17.10.2018.

  6. Anton Pronoza, Andrey Chechulin. Component for interaction with a hybrid data storage of heterogeneous objects of a social network . Federal Service for Intellectual Property. Certificate No 2018663493. Registered in the Computer Program Registry 29.10.2018.

  7. Maxim Kolomeec, Andrey Chechulin, Igor Kotenko. Component for visualization of communication graphs of social network objects using augmented reality technology. Federal Service for Intellectual Property. Certificate No 2018663594. Registered in the Computer Program Registry 31.10.2018.

  8. Andrey Chechulin, Igor Kotenko. Component for definition of web page categories on the base of text features. Federal Service for Intellectual Property. Certificate No 2018663639. Registered in the Computer Program Registry 01.11.2018.

  9. Andrey Chechulin. Component for analytical modeling of attacks in a computer network on the base of the use of a hybrid ontological security data repository. Federal Service for Intellectual Property. Certificate No 2018663641. Registered in the Computer Program Registry 01.11.2018.

  10. Maxim Kolomeec, Andrey Chechulin, Igor Kotenko. The module of human-computer interaction with the information panel of the computer network visualization system. Federal Service for Intellectual Property. Certificate No 2018663862. Registered in the Computer Program Registry 06.11.2018.

  11. Maxim Kolomeec, Andrey Chechulin, Igor Kotenko, Igor Saenko. The component of the role-based access control model visualization based on triangular matrices. Federal Service for Intellectual Property. Certificate No 2018663991. Registered in the Computer Program Registry 08.11.2018.

2017

  1. Vasily Desnitsky, Igor Parashchuk, Andrey Chechulin. Modeling of the attacks on wireless modules if mobile network. Federal Service for Intellectual Property. Certificate No 2017619724. Registered in the Computer Program Registry 19.09.2017.

  2. Mikhail Bulgakov, Andrey Chechulin, Igor Kotenko. Component for data extraction from control channels of railway model. Federal Service for Intellectual Property. Certificate No 2017660182. Registered in the Computer Program Registry 19.09.2017.

  3. Vasily Desnitsky, Igor Kotenko, Andrey Chechulin. Processing of security events from the cyberphysical water supply management system. Federal Service for Intellectual Property. Certificate No 2017660183. Registered in the Computer Program Registry 19.09.2017.

  4. Maxim Kolomeec, Andrey Chechulin, Igor Kotenko. Visual interface for Smart home security system management. Federal Service for Intellectual Property. Certificate No 2017661653. Registered in the Computer Program Registry 17.10.2017.

  5. Dmitry Levshun, Igor Kotenko, Andrey Chechulin. Repository for heterogeneous data from the hardware elements of the smart home. Federal Service for Intellectual Property. Certificate No 2017620996. Registered in the database Registry 01.09.2017.

  6. Elena Doynikova, Andrey Chechulin, Andrey Fedorchenko. Component for data normalization from external sources for building a hybrid security repository. Federal Service for Intellectual Property. Certificate No 2017663405. Registered in the Computer Program Registry 01.12.2017.

  7. Andrey Fedorchenko, Andrey Chechulin, Elena Doynikova. Component for analysis of semi-structured databases for building a hybrid security repository. Federal Service for Intellectual Property. Certificate No 2017663404. Registered in the Computer Program Registry 01.12.2017.

2016

  1. Dmitry Levshun, Andrey Chechulin, Igor Kotenko. System for support and management of database of the room access control and management system based on the contactless smart cards. Federal Service for Intellectual Property. Certificate No 2016612543. Registered in the Computer Program Registry 01.03.2016.

  2. Maxim Kolomeets, Andrey Chechulin. Component for network topology visualization using graphs. Certificate ¹ 2016614486. Registered in the Computer Program Registry 25.04.2016.

  3. Maxim Kolomeets, Andrey Chechulin, Igor Kotenko. Component for network security metrics visualization using matrices. Certificate ¹ 2016614487. Registered in the Computer Program Registry 25.04.2016.

  4. Igor Saenko, Andrey Chechulin, Igor Kotenko, Fadey Skorik. Software for operational classification of data about the network status based on the using of artificial neural networks. Certificate ¹ 2016614485. Registered in the Computer Program Registry 25.04.2016.

  5. Igor Saenko, Andrey Chechulin, Sergey Ageev, Alexander Bogdanov. Software for adaptive network traffic analysis for the information security risks evaluation. Certificate ¹ 2016614488. Registered in the Computer Program Registry 25.04.2016.

  6. Igor Kotenko, Maxim Kolomeets, Andrey Chechulin. Component for creation of patterns and retrieval of information objects and relationships between them for visualization of unformalized data with heterogeneous structure. Certificate ¹ 2016663182. Registered in the Computer Program Registry 29.11.2016.

  7. Dmitry Levshun, Andrey Chechulin. Database of the logging server of a secure access control system for Smart House model. Federal Service for Intellectual Property. Certificate N 2016621608. Registered in the database Registry 29.11.2016.

  8. Maxim Kolomeets, Andrey Chechulin, Igor Kotenko. Component for retrieval of information objects and links between them based on patterns, normalization and reducing of the dimension of the information objects and for forming a multi-dimensional matrix of connections between information objects. Certificate ¹ 2016663963. Registered in the Computer Program Registry 20.12.2016.

  9. Maxim Kolomeets, Andrey Chechulin. Component implementing application programming interfaces for providing access to the visualization results for external information systems. Certificate ¹ 2016663709. Registered in the Computer Program Registry 14.12.2016.

  10. Andrey Fedorchenko, Andrey Chechulin. Component for the expert evaluation of the quality of visualization of data with unformalized heterogeneous structure. Certificate ¹ 2016663861. Registered in the Computer Program Registry 19.12.2016.

  11. Dmitry Levshun, Andrey Chechulin, Igor Kotenko. Component implementing the network level of interaction between the controllers based on the I2C protocol. Federal Service for Intellectual Property. Certificate N 2016663951. Registered in the database Registry 20.12.2016.

  12. Mikhail Bulgakov, Andrey Chechulin, Igor Kotenko. Component for DCC protocol analysis for implementing the railways as the obhect of security incident management. Federal Service for Intellectual Property. Certificate N 2016663840. Registered in the database Registry 19.12.2016.

  13. Igor Saenko, Alexei Kushnerevuch, Igor Kotenko, Andrey Chechulin. Component for analysis of big data sets for the computer networks security monitoring. Certificate ¹ 2016663929. Registered in the Computer Program Registry 19.12.2016.

2015

  1. Elena Doynikova, Andrey Chechulin. Generator of random attack sequences for testing of networks of Internet of Things. Federal Service for Intellectual Property. Certificate No 2015615368. Registered in the Computer Program Registry 15.05.2015.

  2. Igor Kotenko, Andrey Chechulin. Attack graph visualization module for network security evaluation system. Federal Service for Intellectual Property. Certificate No 2015615640. Registered in the Computer Program Registry 22.05.2015.

  3. Andrey Chechulin, Igor Kotenko. Network topology visualization module for security information and event management in information and telecommunication systems. Federal Service for Intellectual Property. Certificate No 2015615773. Registered in the Computer Program Registry 22.05.2015.

  4. Maxim Kolomeets, Andrey Chechulin. Room access control and management system client based on the contactless smart cards. Federal Service for Intellectual Property. Certificate No 2015662136. Registered in the Computer Program Registry 17.11.2015.

  5. Maxim Kolomeets, Andrey Chechulin, Igor Kotenko. Room access control and management server based on the contactless smart cards. Federal Service for Intellectual Property. Certificate No 2015662190. Registered in the Computer Program Registry 18.11.2015.

  6. Dmitry Levshun, Andrey Chechulin. Room access control and management system embedded device's sketch based on the contactless smart cards. Federal Service for Intellectual Property. Certificate No 2015662137. Registered in the Computer Program Registry 17.11.2015.

  7. Andrey Fedorchenko, Andrey Chechulin. The statistics analisys and qualitative parameters evoluation component of integrated vulnerability database. Federal Service for Intellectual Property. Certificate N 2015662208. Registered in the Computer Program Registry 18.11.2015.

  8. Andrey Fedorchenko, Andrey Chechulin. The integrated vulnerability database for monitoring systems and security management in information and telecommunication systems. Federal Service for Intellectual Property. Certificate N 2015621655. Registered in the database Registry 17.11.2015.

  9. Igor Saenko, Andrey Chechulin, Sergey Ageev, Igor Kotenko. Classifier of states of computer network elements for risk assessment of information security threats. Federal Service for Intellectual Property. Certificate N 2015662186. Registered in the database Registry 18.11.2015.

  10. Igor Saenko, Andrey Chechulin, Valery Kuvaev, Nikolai Barikin. Software for the operational efficiency evaluation of access to the resources of the common information and communication environment. Federal Service for Intellectual Property. Certificate N 2015662574. Registered in the database Registry 16.11.2015.

  11. Andrey Chechulin, Elena Doyninkova. Component for analysis of the attack models for the protection of the information and telecommunication systems. Federal Service for Intellectual Property. Certificate N 2015662026. Registered in the database Registry 16.11.2015.

  12. Andrey Chechulin, Igor Kotenko. Component of the attack modeling for the protection of the information and telecommunication systems. Federal Service for Intellectual Property. Certificate N 2015662484. Registered in the database Registry 25.11.2015.

2014

  1. Igor Saenko, Sergey Ageev, Andrey Chechulin. Decision support in risk evaluation of information security threats in multiservice networks. Federal Service for Intellectual Property. Certificate No 2014660775. Registered in the Computer Program Registry 15.10.2014.

  2. Igor Saenko, Fadey Skorik, Andrey Chechulin. Solution to the problem of forecasting the network status. Federal Service for Intellectual Property. Certificate No 2014660856. Registered in the Computer Program Registry 17.10.2014.

  3. Igor Kotenko, Elena Doynikova, Andrey Chechulin. Calculation of the security metrics for the monitoring of the current security state of information and telecommunication systems for the deńision support of the responses on the security incidents. Federal Service for Intellectual Property. Certificate No 2014661026. Registered in the Computer Program Registry 22.10.2014.

  4. Igor Kotenko, Andrey Chechulin. Malefactor model formation for security evaluation of information and telecommunication systems. Federal Service for Intellectual Property. Certificate No 2014661028. Registered in the Computer Program Registry 22.10.2014.

2012

  1. Igor Kotenko, Andrey Chechulin, Mikhail Stepashkin. Designer of specifications of computer networks. Certificate No.2012615244. Registered in the Computer Program Registry 9.07.2012.

  2. Igor Kotenko, Andrey Chechulin, Mikhail Stepashkin. System of security analysis of computer networks. Certificate No.2012615245. Registered in the Computer Program Registry 9.07.2012.

  3. Igor Kotenko, Andrey Chechulin, Mikhail Stepashkin. Update of vulnerability database. Certificate No.2012615247. Registered in the Computer Program Registry 9.07.2012.

  4. Igor Saenko, Andrey Chechulin. The solution of the task of synthesizing the VPN network topology for distributed enterprise management system using genetic algorithm. Certificate No.2012615246. Registered in the Computer Program Registry 9.07.2012.

  5. Sergey Alyshev, Sergey Kruglov, Igor Saenko, Aleksandr Sidorov, Andrey Chechulin. The solution of the role mining problem by genetic algorithm. Certificate No.2012612176. Registered in the Computer Program Registry 28.02.2012.

Top 

Projects

Current Grants and Projects

Former Projects

  • Andrey Chechulin (Principal Investigator). Grant of Russian Science Foundation ¹ 18-71-10094-P "Monitoring and counteraction to malicious influence in the information space of social networks", 2021-2023 (Principal Investigator).
  • Andrey Chechulin (Principal Investigator). "Models, methods and algorithms of human-computer interaction for information security area". Research grant # 20-37-90130 "PhD students" of Russian Foundation of Basic Research, 2020-2023 (Principal Investigator).
  • Andrey Chechulin (Principal Investigator). "Development of methods for vulnerabilities detection for human-computer interaction interfaces of the Smart City transport infrastructure". Research grant # 19-29-06099 of Russian Foundation of Basic Research, 2019-2022 (Principal Investigator).
    Report-2020-29-06099-short.pdf [application/pdf] (147123 bytes)
    Report-2022-29-06099-short.pdf [application/pdf] (123421 bytes)
    Report-2023-29-06099-short.pdf [application/pdf] (0 bytes)
  • Elena Doynikova (Principal Investigator). “Techniques of security assessment and response to cyber attacks in the industrial Internet of Things based on the ontology of security metrics and methods of intellectual analysis of big data”. Research grant # 19-07-01246 A of Russian Foundation of Basic Research, 2019-2021 (Researcher).
    Report-2019-19-07-01246-a-short.pdf [application/pdf] (215676 bytes)
    Report-2020-19-07-01246-a-short.pdf [application/pdf] (203097 bytes)
    Report-2021-19-07-01246-a-short.pdf [application/pdf ] (400195 bytes)
  • Vasiliy Desnitsky (Principal Investigator). “Models, techniques and algorithms for security analysis of software and hardware components of wireless sensor networks”. Research grant # 19-07-00953 A of Russian Foundation of Basic Research, 2019-2021 (Researcher).
    Report-2019-19-07-00953-a-short.pdf [application/pdf] (195496 bytes)
    Report-2020-19-07-00953-a-short.pdf [application/pdf] (201695 bytes)
    Report-2021-19-07-00953-a-short.pdf [application/pdf ] (205488 bytes)
  • Andrey Chechulin (Principal Investigator). "Security Aspects of Cyberphysical Systems". Research grant # 19-17-50205 of Russian Foundation of Basic Research, 2019-2020 (Principal Investigator).
  • Igor Kotenko (Principal Investigator) – State Contract No. 05.607.21.0322 "Development of methods, models, algorithms and software tools based on detecting deviations in heuristics of ultra-high volume traffic to detect network attacks and protect against them". Project of Russian Ministry of Education and Science in scope of the Program "Research and development in priority directions of evolution of the scientific and technological complex of Russia on 2014-2020", 2019-2020 (Researcher).
    Report-FTP-Results-05.607.21.0322.pdf [application/pdf] (204912 bytes)
  • Andrey Chechulin (Principal Investigator). Grant of Russian Science Foundation ¹ 18-71-10094 "Monitoring and counteraction to malicious influence in the information space of social networks", 2018-2021 (Principal Investigator).
    RSCF_18-71-10094_Report_2020_eng.pdf [application/pdf] (196723 bytes)
    RSCF_18-71-10094_Report_2020_rus.pdf [application/pdf] (258925 bytes)
    RSCF_18-71-10094_Report_2021_eng.pdf [application/pdf] (178723 bytes)
    RSCF_18-71-10094_Report_2021_rus.pdf [application/pdf] (194835 bytes)
  • Igor Kotenko (Principal Investigator). "Monitoring and identification of destructive information impacts and negative personal tendencies of the younger generation when interacting with the Internet space on the basis of methods of neurocomputer and neural network processing of Internet content" Research grant # 18-29-22034 of Russian Foundation of Basic Research, 2018-2021 (Researcher).
    Report-2019-18-29-22034-short.pdf [application/pdf] (147123 bytes)
    Report-2020-18-29-22034-short.pdf [application/pdf] (356989 bytes)
  • Igor Saenko (Principal Investigator). Grant of Russian Science Foundation ¹ 18-11-00302 "Intelligent digital network content processing for effective detection and counteraction of inappropriate, dubious and harmful information", 2018-2020 (Lead researcher).
    RSF-Results-2018-18-11-00302-Eng.pdf [application/pdf] (94208 bytes)
    RSF-Results-2018-18-11-00302-Rus.pdf [application/pdf] (245760 bytes)
  • Andrey Chechulin (Principal Investigator). "Research, development and application of Augmented Reality technology for cyber and cyberphysical systems security data visualization" Research grant # 18-37-20047 of Russian Foundation of Basic Research, 2018-2020 (Principal Investigator).
    Report-2019-18-37-20047-short.pdf [application/pdf] (208896 bytes)
  • Igor Kotenko (Principal Investigator). NIR-FUND of ITMO University ¹ 717075 "Methods, Models, Methods, Algorithms, Protocols and Applications for ensuring Information Security of Cyber-Physical Systems", 2017-2019 (Lead researcher).
  • Andrey Chechulin (Principal Investigator). President's of Russian Federation Grant ¹ MK-314.2017.9 "Methods, models and algorithms for the construction and usage of a hybrid data warehouse for analytical processing of the information and security events", 2017-2018 (Principal Investigator).
  • Elena Doynikova (Principal Investigator). “Development of models, techniques and alghoritms for automated countermeasures generation in process of security information and events management”. Research grant # 16-37-00338-mol_a of Russian Foundation of Basic Research, 2016-2017 (Researcher).
    Report-2016-16-37-00338-mol-a-short.pdf [application/pdf] (308434 bytes)
    Report-2017-16-37-00338-mol-a-short.pdf [application/pdf] (139264 bytes)
  • Andrey Chechulin (Principal Investigator). “Investigation and development of data mining techniques for warehouses that contain multiple fact tables”. Research grant # 16-37-50067 of Russian Foundation of Basic Research, 2016-2016 (Principal Investigator).
    Report-2016-16-37-50067-mol_nr-short.pdf [application/pdf] (733903 bytes)
  • Andrey Tutorskij (Principal Investigator). “Investigation and development of data models and approaches for their analysis for construction of search system for unified repository for multimedia data from field ethnographic expeditions”. Research grant # 16-37-50073 of Russian Foundation of Basic Research, 2016., 2016-2016 (Researcher).
  • Andrey Chechulin (Principal Investigator). “Development of mathematical models, techniques and alghoritms of security evaluation, attack modelling and countermeasures selection in near-real time mode”. Research grant # 15-07-07451-a of Russian Foundation of Basic Research, 2015-2017 (Principal Investigator).
    Report-2015-15-07-07451-a-short.pdf [application/pdf] (422782 bytes)
    Report-2016-15-07-07451-a-short.pdf [application/pdf] (422782 bytes)
    Report-2017-15-07-07451-a-short.pdf [application/pdf] (422782 bytes)
  • Igor Kotenko (Principal Investigator) – Grant of Russian Science Foundation ¹ 15-11-30029 "Incident management and counteraction against targeted cyber-physical attacks in distributed largescaled mission critical systems taking into account cloud services and networks of the Internet of Things", 2015-2017., 2015-2017 (Researcher).
    RSF-Results-2015-15-11-30029-Eng.pdf [application/pdf] (18843 bytes)
    RSF-Results-2015-15-11-30029-Rus.pdf [application/pdf] (128851 bytes)
    RSF-Results-2016-15-11-30029-Eng.pdf [application/pdf] (327680 bytes)
    RSF-Results-2016-15-11-30029-Rus.pdf [application/pdf] (442368 bytes)
    RSF-Results-2017-15-11-30029-Eng.pdf [application/pdf] (327680 bytes)
    RSF-Results-2017-15-11-30029-Rus.pdf [application/pdf] (438272 bytes)
  • Andrey Tutorskij (Principal Investigator). “Investigation and development of approaches for construction of unified repository for multimedia data from field ethnographic expeditions”. Research grant # 15-37-51126 of Russian Foundation of Basic Research, 2015., 2015-2015 (Researcher).
  • Vasiliy Desnitsky (Principal Investigator). “Development and investigation of models and techniques for design and verification of combined protection mechanisms for information and telecommunication systems with embedded devices on the base of expert knowledge”. Research grant # 14-07-00417-a of Russian Foundation of Basic Research, 2014-2016 (Researcher).
    Report-2014-14-07-00417-a-short.pdf [application/pdf] (258333 bytes)
    Report-2015-14-07-00417-a-short.pdf [application/pdf] (516620 bytes)
    Report-2016-14-07-00417-a-short.pdf [application/pdf] (740843 bytes)
  • Igor Saenko (Principal Investigator). “Models and methods of access to resources in a unified information and communication space of heterogeneous systems based on artificial intelligence technology”. Research grant # 14-07-00697-a of Russian Foundation of Basic Research, 2014-2016 (Lead researcher).
    Report-2014-14-07-00697-a-short.pdf [application/pdf] (303104 bytes)
    Report-2015-14-07-00697-a-short.pdf [application/pdf] (395000 bytes)
    Report-2016-14-07-00697-a-short.pdf [application/pdf] (614957 bytes)
  • ENGENSEC
    Igor Kotenko (Principal Investigator from SPIIRAS). “Educating the Next generation experts in Cyber Security: the new EU-recognized Master’s program”. Research Project of the European Community program TEMPUS ¹ 544455-TEMPUS-1-2013-1-SE-TEMPUS-JPCR (http://engensec.eu/), 2014-2016 (Digital Forensic Course manager).
  • Igor Kotenko (Principal Investigator) – State Contract No. 14.604.21.0137 "Development of the technologies of the interactive visualization of the unformalized heterogeneous data for decision support systems in scope of the information security monitoring and management in the information and telecommunication systems". Project of Russian Ministry of Education and Science in scope of the Program "Research and development in priority directions of evolution of the scientific and technological complex of Russia on 2014-2020", 2014-2016., 2014-2016 (Lead researcher).
    14.604.21.0137_current_status.pdf [application/pdf] (138103 bytes)
  • Igor Kotenko (Principal Investigator) – State Contract No. 14.604.21.0147 "Development of the methods for aggregation, normalization, analysis and visualization of big arrays of the heterogeneous, structured, semi-structured and unstructured data for the security monitoring and management of the distributed network of the electronic consumer devices". Project of Russian Ministry of Education and Science in scope of the Program "Research and development in priority directions of evolution of the scientific and technological complex of Russia on 2014-2020", 2014-2016., 2014-2016 (Researcher).
    14.604.21.0147_current_status.pdf [application/pdf] (142791 bytes)
  • Igor Kotenko (Principal Investigator). State Contract No. 14.604.21.0033 “Models, methods and software for development and analysis of information-telecommunication system security components for Internet of Things concept”. Project of Russian Ministry of Education and Science in scope of the Program "Research and development in priority directions of evolution of the scientific and technological complex of Russia on 2014-2020", 2014-2015., 2014-2015 (Researcher).
    14.604.21.0033_current_status [application/pdf] (262992 bytes)
  • Andrey Chechulin (Principal Investigator). “Investigation and development of heuristic intrusion detection approaches based on data mining techniques for telecommunication networks”. Research grant # 14-37-50735 of Russian Foundation of Basic Research, 2014-2014 (Principal Investigator).
    Report-2014-14-37-50735-mol_nr-short.pdf [application/pdf] (1118208 bytes)
  • Igor Kotenko (Principal Investigator) – State Contract No. 14.616.21.0028 "Perspective methods of correlation of the security information and incidents management information in the critical infrastructures on the base of the convergence of the technologies of the security awareness on the physical and logical levels". Project of Russian Ministry of Education and Science in scope of the Program "Research and development in priority directions of evolution of the scientific and technological complex of Russia on 2014-2020", 2014., 2014-2014 (Lead researcher).
  • Igor Kotenko (Principal Investigator). “Mathematical models and methods for monitoring and management of information security in computer networks and systems of critical infrastructures based on intelligent services of information protection”. Research grant # 13-01-00843-a of Russian Foundation of Basic Research, 2013-2015 (Researcher).
    Report-2013-13-01-00843-a-short.pdf [application/pdf] (294747 bytes)
    Report-2014-13-01-00843-a-short.pdf [application/pdf] (761856 bytes)
    Report-2015-13-01-00843-a-short.pdf [application/pdf] (562916 bytes)
  • Igor Kotenko (Principal Investigator). “Mathematical models, methods and algorithms of attack modeling, computer systems and networks protection analysis, information security risk analysis and decision-making for selection of security mechanisms in computer systems and networks”. Program "Architectural and software solutions, and security of data-processing supercomputer complexes of new generations" of the Russian Academy of Sciences Branch "Nanotechnologies and Information Technologies", 2012-2014 (Researcher).
  • Igor Kotenko (Principal Investigator). Project in agreement with F-Secure corporation, 2012-2013 (Researcher).
  • Igor Kotenko (Principal Investigator). State Contract No. 11.519.11.4008 “Research and development of methods, models and algorithms of intellectualizing the secirity services in critical infrastructures”. Project of Russian Ministry of Education and Science, 2011-2013 (Researcher).
  • Igor Saenko (Principal Investigator). “Mathematical models and methods of analysis and synthesis of access systems to information and network resources in modern and advanced computer systems and networks through the establishment and application of artificial intelligence. Research grant # 11-07-00435-ą of Russian Foundation of Basic Research, 2011-2013 (Lead researcher).
    Report-2011-11-07-00435-a-short.pdf [application/pdf] (287595 bytes)
    Report-2012-11-07-00435-a-short.pdf [application/pdf] (344443 bytes)
    Report-2013-11-07-00435-a-short.pdf [application/pdf] (317185 bytes)
  • Igor Kotenko (Principal Investigator). “Mathematical models and methods of integrated protection against network attacks and malware in computer networks and systems based on hybrid multi-agent modeling and simulation of computer counteraction, verified adaptive security policies and proactive monitoring by data mining”. Research grant # 10-01-00826-a of Russian Foundation of Basic Research, 2010-2013 (Researcher).
    Report-2010-10-01-00826-a-short.pdf [application/pdf] (191714 bytes)
    Report-2011-10-01-00826-a-short.pdf [application/pdf] (260794 bytes)
    Report-2012-10-01-00826-a-short.pdf [application/pdf] (348160 bytes)
  • Igor Kotenko (Principal Investigator from SPIIRAS). “Design of Secure and energy-efficient embedded systems for Future internet applications (SecFutur)”. Research Project of the European Community seventh framework program (FP7). Contract No. 256668 (http://www.secfutur.eu/), 2010-2013 (Researcher).
  • Igor Kotenko (Principal Investigator from SPIIRAS). “MAnagement of Security information and events in Service InFrastructures (MASSIF)”. Research Project of the European Community seventh framework program (FP7). Contract No. 257475 (http://www.massif-project.eu/), 2010-2013 (Lead researcher).
  • Igor Kotenko (Principal Investigator). Project in agreement with F-Secure corporation, 2010-2011 (Researcher).
  • Igor Kotenko (Principal Investigator). “Mathematical Models, Methods and Algorithms of Proactive Protection against Malware in Computer Networks and Systems”. Program "Architecture, system solutions, software, standardization and information security of computer complexes of new generations" of the Russian Academy of Sciences Branch "Nanotechnologies and Information Technologies", 2009-2011 (Researcher).
  • Igor Kotenko (Principal Investigator). Project in agreement with F-Secure corporation, 2009-2009 (Researcher).
  • Igor Kotenko (Principal Investigator). Project on demand of Section of Applied Problems of Russian Academy of Sciences. Governmental contract, 2008-2009 (Researcher).
  • Igor Kotenko (Principal Investigator“Models and methods of construction and functioning support of intelligent adaptive security systems based on modeling and simulation of security systems behavior, realization of verified security policies, security evaluation and proactive monitoring”. Research grant # 07-01-00547 of Russian Foundation of Basic Research, 2007-2009 (Researcher).
    Report-07-01-00547a-2007short.pdf [application/pdf] (193198 bytes)
    Report-07-01-00547a-2008short.pdf [application/pdf] (205945 bytes)
    Report-07-01-00547a-2009short.pdf [application/pdf] (943498 bytes)
  • Igor Kotenko (Principal Investigator). “Automatic Detection and Response Techniques against Internet Worms”. The subcontract with International Research Institute for Advanced Systems (IRIAS) according to contract with Hewlett-Packard, 2006-2007 (Researcher).
  • Igor Kotenko (Principal Investigator). “Mathematical Models of Active Analysis of Vulnerabilities, Intrusion Detection and Network Attacks Counteraction in Computer Networks based on Multi-agent Technologies”. Program "Optimization of computer architectures to particular classes of tasks, information assurance of network technologies" of the Russian Academy of Sciences Branch "Nanotechnologies and Information Technologies"., 2003-2008 (Researcher).

Top 

Main publications

Books and Chapters in Books

  1. Vasily Desnitsky, Dmitry Sakharov, Andrey Chechulin, Igor Ushakov, Tatiana Zakharova. Information Security for Data Centers. Tutorial. SPb.: SPbSUT, 2019. - 92 pages. // https://elibrary.ru/item.asp?id=38554623
  2. Igor Kotenko, Igor Saenko, Andrey Chechulin, Olga Polubelova, Evgenia Novikova, Elena Doinikova, Andrey Shorov, Vasily Desnitsky. Intelligent information security services in critical infrastructures. Monography / Ed. Igor Kotenko and Igor Sayenko. St. Petersburg: BHV Publishing House, 2019. 400š. ISBN 978-5-9775-3968-5 https://www.elibrary.ru/item.asp?id=42927796 // https://elibrary.ru/item.asp?id=42927796
  3. Igor Kotenko, Elena Doynikova, Andrey Chechulin, Andrey Fedorchenko. AI- and Metrics-Based Vulnerability-Centric Cyber Security Assessment and Countermeasure Selection: An Artificial Intelligence Approach //Chapter in book: Guide to Vulnerability Analysis for Computer Networks and Systems - An Artificial Intelligence Approach. S. Parkinson, A. Crampton, R. Hill (eds). Springer, Cham, 2018. P.101-130. DOI: https://doi.org/10.1007/978-3-319-92624-7_5. Print ISBN 978-3-319-92623-0. Online ISBN 978-3-319-92624-7 (WoS and Scopus).
  4. Kotenko I.V., Saenko I.B., Chechulin A.A. Protection against unwanted and malicious information in global information networks // Information-psychological and cognitive security. Collective monograph / Ed. I. F. Kefeli, R. M. Yusupova. St. Petersburg .: Publishing house "Aurora" 2017. 300 P. - 175-194 // https://pure.spbu.ru/ws/portalfiles/portal/9364702 // https://elibrary.ru/item.asp?id=37414463

Papers

2024

  1. M. Kolomeets, O. Tushkanova, V. Desnitsky, L. Vitkova, A. Chechulin. Experimental evaluation: can humans recognise social media bots? // Big Data and Cognitive Computing. 2024. Ņ. 8. ¹ 3. Ń. 24.DOI: 10.3390/bdcc8030024 // https://elibrary.ru/item.asp?id=66173046
  2. D. Klishin, A. Chechulin. Methodology for Analyzing the Impact of Digital Transformation of the Information Security Management Process on the Enterprise Architecture // Lecture Notes in Electrical Engineering. 2024. V. 1130. Š. 435-443.
  3. A.A. Dalek, A.A. Chechulin, V/O. Popova. Creating and analyzing datasets using ebpftechnology in container infrastructures // Informatization and communications. 2024. No. 1. pp. 107-112. DOI: 10.34219/2078-8320-2024-15-107-112 // https://elibrary.ru/item.asp?id=60028825 (in Russian).
  4. M.D. Gorda, A.A. Chechulin. Methodology of investigationphishing attacks // Informatization and communications. 2024. No. 2. pp. 109-116. DOI: 10.34219/2078-8320-2024-15-2-109-116 // https://elibrary.ru/item.asp?id=60775782 (in Russian).
  5. A.A. Chechulin. Calculation of computer network securitymetrics based on analytical modeling methods // Informatization and communications. 2024. No. 3. pp. 99-104. DOI: 10.34219/2078-8320-2024-15-3-99-104 // https://elibrary.ru/item.asp?id=63648824 (in Russian).
  6. A.A. Chechulin. Evaluation of visual interfaces in information security management systems // Proceedings of educational institutions of communications. 2024. Vol. 10. No. 3. pp. 116-126. DOI: 10.31854/1813-324X-2024-10-3-116-126 // https://elibrary.ru/item.asp?id=68450283 (in Russian).
  7. A.A. Chechulin. Modeling of the intruder, infrastructure, and attacks in information security systems // Scientific and analytical journal "Bulletin of the St. Petersburg University of the State Fire Service of the Ministry of Emergency Situations of Russia". 2024. No. 2. pp. 70-79. DOI: 10.61260/2218-130X-2024-2-70-79 // https://elibrary.ru/item.asp?id=68004585 (in Russian).
  8. D.V. Klishin, A.A. Chechulin. Lidentification of quantitative indicators of processes to assess the level of information security // Information protection. Insider. 2024. No. 3 (117). pp. 10-18. // https://elibrary.ru/item.asp?id=67355845 (in Russian).
  9. M.D. Gorda, A.A. Chechulin. Approach to the collection of digital evidence for the investigation of cyber attacks // In the collection: Criminalistics science without borders: traditions and innovations. Materials of the international scientific and practical conference. St. Petersburg, 2024. pp. 487-491. // https://elibrary.ru/item.asp?id=65643803 (in Russian).
  10. A.A. Chechulin, M.V. Kolomiets. An approach to detecting malicious bots in the vkontakte social network and evaluating their parameters // Proceedings of educational institutions of communications. 2024. Vol. 10. No. 2. pp. 92-101. DOI: 10.31854/1813-324X-2024-10-2-92-101 // https://elibrary.ru/item.asp?id=65846418 (in Russian).
  11. M.D. Gorda, A.A. Kotov, A.A. Chechulin. Features of digital evidence collection in the investigation of cybercrimes // In the collection: Current problems of infotelecommunications in science and education (Apino 2024). Collection of scientific articles of the XIII International Scientific, technical and scientific-methodical conference in 4 volumes.. St. Petersburg, 2024. pp. 246-250. // https://elibrary.ru/item.asp?id=67337378 (in Russian).
  12. A.S. Dayneko, A.P. Kyuner, A.A. Chechulin A.A. Social engineering. attacker and attacked model // In the collection: Current problems of infotelecommunications in science and education (Apino 2024). Collection of scientific articles of the XIII International Scientific, technical and scientific-methodical conference in 4 volumes.. St. Petersburg, 2024. pp. 263-266. // https://elibrary.ru/item.asp?id=67337381 (in Russian).
  13. N.D. Dubotolkov, A.A. Chechulin. Review and systematization of attacks on container systems // In the collection: Current problems of infotelecommunications in science and education (Apino 2024). Collection of scientific articles of the XIII International Scientific, technical and scientific-methodical conference in 4 volumes.. St. Petersburg, 2024. pp. 302-306.// https://elibrary.ru/item.asp?id=67337389 (in Russian).
  14. D.V. Klishin, A.A. Chechulin. Determining quantitative indicators for assessing information security processes // In the collection: Current problems of infotelecommunications in science and education (Apino 2024). Collection of scientific articles of the XIII International Scientific, technical and scientific-methodical conference in 4 volumes.. St. Petersburg, 2024. pp. 435-439. // https://elibrary.ru/item.asp?id=67337413 (in Russian).
  15. M.D. Gorod, A.A. Chechulin. Problems of initiation of the spread of cybercrimes within an organization and their solutions // in the collection: St. Petersburg International Forensic Forum Materials of the international scientific and practical conference St. Petersburg, 2024. pp. 623-625. // https://elibrary.ru/item.asp?id=67359523 (in Russian).

2023

  1. Maxim Kolomeets, Vasily Desnitsky, Igor Kotenko, Andrey Chechulin. Graph Visualization: Alternative Models Inspired by Bioinformatics // Sensors. 2023. Ņ. 23. ¹ 7. Ń. 3747. DOI: 10.3390/s23073747 // https://elibrary.ru/item.asp?id=61798233
  2. Dmitry Vesnin, Dmitry Levshun, Andrey Chechulin. Trademark Similarity Evaluation Using a Combination of ViT and Local Features // Information (Switzerland). 2023. Ņ. 14. ¹ 7. Ń. 398. DOI: 10.3390/info14070398 // DOI: 10.20944/preprints202306.0192.v1 // https://elibrary.ru/item.asp?id=63188086
  3. Maxim Kolomeets, Andrey Chechulin. Social bot metrics // Social Network Analysis and Mining. 2023. Ņ. 13. ¹ 1. Ń. 36. DOI:10.1007/s13278-023-01038-3 // https://elibrary.ru/item.asp?id=61272319
  4. Dmitry Levshun, Olga Tushkanova, Andrey Chechulin. Two-model active learning approach for inappropriate information classification in social networks // International Journal of Information Security. 2023. Ņ. 22. ¹ 6. Ń. 1921-1936. DOI:10.1007/s10207-023-00726-7 // https://elibrary.ru/item.asp?id=63329930
  5. D.S. Levshun, A.A. Chechulin. Vulnerability categorization for fast multistep attack modelling // Conference of Open Innovations Association, FRUCT. 2023. ¹ 33. Ń. 169-175. DOI:10.23919/FRUCT58615.2023.10143048 // https://elibrary.ru/item.asp?id=53943919
  6. Maxim Kolomeets, Andrey Chechulin, Lidia Vitkova. Technique for Investigating Attacks on a Company’s Reputation on a Social Media Platform. Studies in Computational Intelligence, 2022, 1089 SCI, P. 234–243. DOI:10.1007/978-3-031-29104-3_26
  7. Ksenia Zhernova, Andrey Chechulin. Security Evaluation Method for Perspective Types of Human-Computer Interfaces // Proceedings of the Seventh International Scientific Conference «Intelligent Information Technologies for Industry» (IITI’23). Lecture Notes in Networks and Systems. 2023. V. 776 (1), pp. 39-48. DOI: 10.1007/978-3-031-43792-2_4 // ISBN: 978-3-031-43788-5
  8. Konstantin Izrailov, Nikita Romanov, Andrey Chechulin, Alexander Yaroshenko, Igor Kotenko. Intelligent Selection of Requirements for a Secure Design of Smart City Transport Infrastructure Interfaces // Proceedings of the 16th International Symposium on Intelligent Distributed Computing (IDC-2023). September 13-15, Hamburg, Germany. 2023. P. Pages 135-148
  9. M.V. Kolomeets, A.A. Chechulin. Properties of malicious social bots // Proceedings of educational institutions of communications. 2023. Vol. 9. No. 1. pp. 94-104. DOI: 10.31854/1813-324X-2023-9-1-94-104 // https://elibrary.ru/item.asp?id=50416980 (in Russian).
  10. Andrey Chechulin. The issues of collecting correct and consistentinformation about a computer network // Informatization and communication. 2023. No. 1. pp. 91-94. DOI: 10.34219/2078-8320-2023-14-1-91-94 // https://elibrary.ru/item.asp?id=50516480 (in Russian).
  11. Dmitry Klishin, Andrey Chechulin. Analysis of information security standards // Data analysis and processing systems. 2023. No. 1 (89). pp. 37-54. DOI: 10.17212/2782-2001-2023-1-37-54 // https://elibrary.ru/item.asp?id=50493133 (in Russian).
  12. Maxim Kolomeets, Ksenia Zhernova, Andrey Chechulin. Analysis of threats to interfacesof unmanned vehicles // Informatization and communication. 2023. No. 3. P. 62-75. DOI: 10.34219/2078-8320-2023-14-3-62-75 // https://elibrary.ru/item.asp?id=54668228 (in Russian).
  13. Maxim Gorda, Andrey Chechulin. Cybercrime investigation model // Informatization and communication. 2023. No. 3. P. 92-97. DOI: 10.34219/2078-8320-2023-14-3-92-97 // https://www.elibrary.ru/item.asp?id=54668231 (in Russian).
  14. A.V. Yakovlev, E.V. Tarov, K.E. Izrailov, A.A. Chechulin. Method for detecting source code duplicates based on the random walk algorithm // Scientific and analytical journal "Bulletin of the St. Petersburg University of the State Fire Service of the Ministry of Emergency Situations of Russia". 2023. No. 2. P. 134-146. // https://www.elibrary.ru/item.asp?id=54153824 (in Russian).
  15. K.N. Gorpinchenko, N.H. Voronkova, E.S. Sakhatskaya, A.A. Chechulin. Factor analysis of the unemployment rate in the Russian Federation // Russian Economic Bulletin. 2023. Vol. 6. No. 5. pp. 11-16.// https://www.elibrary.ru/item.asp?id=54261326 (in Russian).
  16. K.N. Zhernova, A.A. Chechulin. Searching for anomalies in security data visualization using artificial neural networks 2023. 3. pp. 39-47. DOI: 10.46418/2079-8199_2023_3_6 // https://www.elibrary.ru/item.asp?id=56006752 (in Russian).
  17. I.V. Paraschuk, A.A. Chechulin. Neuro-fuzzy vulnerability detection method for monitoring the security of processes and means of human-intelligent system interaction within the framework of the "SMART TRANSPORT" concept // Actual problems of infotelecommunications in science and education (APINO 2023). Collection of scientific articles. XII International Scientific-technical and scientific-methodical Conference. In 4 t .. Saint Petersburg, 2023. pp. 837-841. // https://www.elibrary.ru/item.asp?id=54033717 (in Russian).
  18. D.V. Klishin, A.A. Chechulin. Ontology of information security models // In the collection: Actual problems of infotelecommunications in science and education (APINO 2023). Collection of scientific articles. XII International Scientific-technical and scientific-methodical Conference. In 4 t .. St. Petersburg, 2023. pp. 637-642 // https://elibrary.ru/item.asp?id=54033659&pff=1 (in Russian).
  19. K.N. Zhernova, A.A. Chechulin. Methods for searching for vulnerabilities in the unmanned transport environment of the "smart city" // Actual problems of infotelecommunications in science and education (APINO 2023). Collection of scientific articles. XII International Scientific-technical and scientific-methodical Conference. In 4 t .. Saint Petersburg, 2023. pp. 500-504. // https://elibrary.ru/item.asp?id=54033630 (in Russian).
  20. M.D. Cities, A.A. Chechulin. Review and systematization of software tools used to investigate cyber-attacks // In the collection: Actual problems of infotelecommunications in science and education (APINO 2023). Collection of scientific articles. XII International Scientific-technical and scientific-methodical Conference. In 4 t .. St. Petersburg, 2023. pp. 355-359 // https://elibrary.ru/item.asp?id=54033599&pff=1 (in Russian).
  21. V.O. Popova, A.A, Chechulin. Distinctive features of systems of critical infrastructure objects in the context of the problem of countering cyber attacks // In the collection: Current problems of information and telecommunications in science and education (APINO 2023). Collection of scientific articles. XII International scientific-technical and scientific-methodological conference. In 4 volumes. St. Petersburg, 2023. P. 870-872. // https://www.elibrary.ru/item.asp?id=54033724 (in Russian).
  22. K.N. Zhernova, A.A. Chechulin. Methods for searching for vulnerabilities in the unmanned transport environment of the "smart city" // Actual problems of infotelecommunications in science and education (APINO-2023). XII International scientific-technical and scientific-methodological conference; collection of scientific articles in 4 volumes / Edited by S.I. Makarenko; comp. V.S. Elagin, E.A. Anikevich. – St. Petersburg: SPbGUT. 2023. 1. pp. 500-504 // https://elibrary.ru/item.asp?id=54033630&pff=1 (in Russian).
  23. I.B. Paraschuk, A.A. Chechulin. Neuro-fuzzy vulnerability detection method for monitoring the security of processes and means of human-intelligent system interaction within the framework of the "Smart Transport" concept // Actual problems of infotelecommunications in science and education (APINO-2023). XII International scientific-technical and scientific-methodological conference; collection of scientific articles in 4 volumes / Edited by S.I. Makarenko; comp. V.S. Elagin, E.A. Anikevich. – St. Petersburg: SPbGUT. 2023. 1. pp. 837-841 // https://elibrary.ru/item.asp?id=54033717&pff=1 (in Russian).
  24. E.V. Fedorchenko, A.A. Chechulin, I.B. Paraschuk. Investigation of computer incidents as a basis for operational analysis of cybersecurity and a source of source data for architectural components of information security risk management // In the book: Information Security of the regions of Russia (IBRR-2023). XIII St. Petersburg Interregional Conference. Conference materials. St. Petersburg, 2023. pp. 110-111.// https://elibrary.ru/item.asp?id=60024758 (in Russian).
  25. M.D. Gorda, A.A. Chechulin. Review and systematization of relevant phishing attacks techniques // Information security of the regions of Russia (IBRR-2023) XIII-I St. Petersburg Interregional Conference. Materials of the conference, – St. Petersburg, SPOISU. 2023. pp. 72-74 // https://elibrary.ru/item.asp?id=60024730&pff=1 (in Russian).

2022

  1. Lidia Vitkova, Andrey Chechulin, Igor Kotenko. Feature selection for intelligent detection of targeted influence on public opinion in social networks // Proceedings of the Fifth International Scientific Conference “Intelligent Information Technologies for Industry” (IITI’21). pp 421–430 // Lecture Notes in Networks and Systems. 2022. Ņ. 330 LNNS. Ń. 421-430. DOI: 10.1007/978-3-030-87178-9_42 // https://elibrary.ru/item.asp?id=47100014
  2. Ksenia Zhernova, Andrey Chechulin. Overview of vulnerabilities of decision support interfaces based on virtual and augmented reality technologies // Lecture Notes in Networks and Systems. 2022. Ņ. 330 LNNS. Ń. 400-409. DOI: 10.1007/978-3-030-87178-9_40 // https://books.google.ru/books?id=NkVDEAAAQBAJ&printsec=frontcover&hl=ru#v=onepage&q&f=false // https://elibrary.ru/item.asp?id=47105497
  3. Dmitry Levshun, Andrey Chechulin and Igor Kotenko. A Technique for the Design of Abstract Models of Microcontroller-Based Physical Security Systems // Studies in Computational Intelligence. Springer, Cham. Vol. 1026. P. 397-406. DOI: 10.1007/978-3-030-96627-0_36. // https://elibrary.ru/item.asp?id=48587927
  4. Vasily Desnitsky, Andrey Chechulin, Igor Kotenko. Multi-aspect based approach to attack detection in iot clouds // Sensors. 2022. Ņ. 22. ¹ 5, Ļīš˙äźīāūé ķīģåš: 1831. DOI: 10.3390/s22051831 https://www.elibrary.ru/item.asp?id=48184560
  5. Dmitry Levshun, Andrey Chechulin, Igor Kotenko. Security and privacy analysis of smartphone-based driver monitoring systems from the developer’s point of view // Sensors. 2022. Ņ. 22. ¹ 13, P. 5063. DOI: 10.3390/s22135063 // https://elibrary.ru/item.asp?id=49158277
  6. Konstantin Izrailov, Dmitry Levshun, Igor Kotenko, Andrey Chechulin. Classification and analysis of vulnerabilities in mobile device infrastructure interfaces // Communications in Computer and Information Science. 2022. Ņ. 1544. Ń. 301-319. DOI: 10.1007/978-981-16-9576-6_21 // https://elibrary.ru/item.asp?id=48149713
  7. Alexey Kashevnik, Ardalyon Ponomarev, Nikolay Shilov, Andrey Chechulin. Threats detection during human-computer interaction in driver monitoring systems // Sensors. 2022. Ņ. 22. ¹ 6. Ļīš˙äźīāūé ķīģåš: 2380 DOI: 10.3390/s22062380 // https://elibrary.ru/item.asp?id=48193047
  8. Ksenia Namyatova, Lidia Vitkova, Andrey Chechulin. An approach to automated assessment of the image of a territorial entity in the media discourse of a foreign states // Studies in Computational Intelligence. 2022. Ņ. 1026. Ń. 215-224. DOI: 10.1007/978-3-030-96627-0_20 // https://elibrary.ru/item.asp?id=48585256
  9. Dmitry Levshun, Olga Tushkanova, Andrey Chechulin. Active learning approach for inappropriate information classification in social networks // Proceedings of the 30th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP 2022). P. 283-289. DOI: 10.1109/PDP55904.2022.00050. // https://elibrary.ru/item.asp?id=48582978
  10. Ksenia Namyatova, Lidia Vitkova, Andrey Chechulin. An approach to automated assessment of the image of a territorial entity in the media discourse of a foreign states // Proceedings of 14th International Symposium on Intelligent Distributed Computing - IDC'2021. Sep 16-18, 2022, Online Conference, Italy (WoS, Scopus, Ļåšå÷åķü ĀĄŹ, ŠČĶÖ)
  11. Lidia Vitkova, Maxim Kolomeets, Andrey Chechulin. Taxonomy and Bot Threats in Social Networks // Conference: 2022 International Russian Automation Conference (RusAutoCon)At: Sochi, Russia. September 2022. PP. 814-819 // DOI:10.1109/RusAutoCon54946.2022.9896268 // file:///C:/Users/Admin/Downloads/094_v2_word_2019-2.pdf
  12. Igor Kotenko, Igor Saenko, Andrey Chechulin, Lidia Vitkova, Maxim Kolomeec, Igor Zelichenok, Maxim Melnik, Denis Makrushin, Nikita Petrevich. Detection of Anomalies and Attacks in Container Systems: An Integrated Approach Based on Black and White Lists. Lecture Notes in Networks and Systems, 2022, 566 LNNS, P. 107–117. DOI:10.1007/978-3-031-19620-1_11
  13. Igor Kotenko, Igor Saenko I.B., Andrey Chechulin, Dmitry Levshun, Sergei Bosyakov, Victor Kochin. The problem of using mobile robotic devices for perimeter monitoring: research analysis and solution approach // Informatization and Communication. 2022. No. 3. pp. 7-14. DOI: 10.34219/2078-8320-2022-13-3-7-14 // https://elibrary.ru/item.asp?id=49389505 (in Russian).
  14. Andrey Chechulin. The elements of the methodology for information security and information protection in computer networks // Informatization and communication. 2022. No. 3. pp. 27-30. DOI: 10.34219/2078-8320-2022-13-3-27-30 // https://elibrary.ru/item.asp?id=49389508 (in Russian).
  15. K.N. Zhernova, A.A. Chechulin. Algorithms for assessing the securityof the human-computer interface //Informatization and Communication. 2022. No. 4. pp. 56-66. DOI: 10.34219/2078-8320-2022-13-4-56-66 // https://elibrary.ru/item.asp?id=49811423 (in Russian).
  16. A.A. Chechulin. The fiasco of the state and ways to prevent it // Trends in the development of science and education. 2022. No. 86-5. pp. 70-73. DOI: 10.18411/tranio-06-2022-208 // https://www.elibrary.ru/item.asp?id=49232591 (in Russian).
  17. M.V. Kolomiets, L.A. Vitkova, O.N. Tushkanova, A.A. Chechulin. Experimental evaluation: can humans recognize social media bots? // Networks in the Global World 2022, - (2022).
  18. D. Vesnin, Andrey Chechulin. Detection of similar trademarks by analysis of the used color palette // In the collection: Actual problems of infotelecommunications in science and education (APINO 2022). XI International Scientific-technical and scientific-methodical conference. St. Petersburg, 2022. pp. 255-259 // https://elibrary.ru/item.asp?id=49522694&pff=1 (in Russian).
  19. Ksenia Zhernova, Konstantin Izrailov, Maxim Kolomeets, Dmitry Levshun, Andrey Chechulin. Conceptual model of the "system-operator" interaction interface based on visualization technologies that take into account the human cognitive apparatus // In the collection: Actual problems of infotelecommunications in science and education (APINO 2022). XI International Scientific-technical and scientific-methodical conference. St. Petersburg, 2022. pp. 460-463. // https://elibrary.ru/item.asp?id=49522737 (in Russian).
  20. Ksenia Zhernova,Andrey Chechulin. Methods for assessing the quality of human-computer interfaces for information security applications based on touch screens // In the collection: Actual problems of infotelecommunications in science and education (APINO 2022). XI International Scientific-technical and scientific-methodical conference. St. Petersburg, 2022. pp. 466-469. // https://elibrary.ru/item.asp?id=49522740 (in Russian).
  21. Maxim Kolomiets, Andrey Chechulin. Visual model of the computer network attack graph // In the collection: Actual problems of infotelecommunications in science and education (APINO 2022). XI International Scientific-technical and scientific-methodical conference. Saint Petersburg, 2022. pp. 589-591 // https://elibrary.ru/item.asp?id=49522769 (in Russian).
  22. Igor Paraschuk, Andrey Chechulin. Fuzzy identification of vulnerabilities in the interfaces of the unmanned transport environment of the «smart city» // In the collection: Actual problems of infotelecommunications in science and education (APINO 2022). XI International Scientific-technical and scientific-methodical conference. St. Petersburg, 2022. pp. 727-732. // https://www.elibrary.ru/item.asp?id=49522800 (in Russian).
  23. V.O. Popova, A.A. Chechulin. Review and analysis of sources in the context of the problem of cyber security and improvement of the security policy of critical infrastructure objects // In the book: Regional Informatics (RI-2022). Jubilee XVIII St. Petersburg International Conference. Conference materials. Saint Petersburg, 2022. pp. 177-178.// https://elibrary.ru/item.asp?id=49977215 (in Russian).
  24. I.V. Paraschuk, A.A. Chechulin. Ensuring the security of unmanned vehicles of the «smart city» using proactive vulnerability search in human-machine interaction interfaces based on the methods of the theory of catastrophes // In the book: Regional Informatics (RI-2022). Jubilee XVIII St. Petersburg International Conference. Conference materials. Saint Petersburg, 2022. pp. 116-118. // https://www.elibrary.ru/item.asp?id=49977162 (in Russian).

2021

  1. Dmitry Levshun, Andrey Chechulin, Igor Kotenko. Design of secure microcontroller-based systems: application to mobile robots for perimeter monitoring // Sensors 2021. Vol. 21, ¹ 24. Ļīš˙äźīāūé ķīģåš: 8451. DOI: 10.3390/s21248451. https://www.mdpi.com/1424-8220/21/24/8451 // https://elibrary.ru/item.asp?id=47541785 (Scopus, WoS, SJR=0.636, Q1)
  2. Maxim Kolomeec, Ksenia Zhernova, Andrey Chechulin. Unmanned Transport Environment Threats // Proceedings of 15th International Conference on Electromechanics and Robotics "Zavalishin's Readings". April 15-18, 2020, Ufa, Russia // Smart Innovation, Systems and Technologies. Springer 2021, Vol. 187. – P. 395-408. 2021. DOI:10.1007/978-981-15-5580-0_32 // https://elibrary.ru/item.asp?id=45282366 (ŠČĶÖ, Scopus)
  3. Yannick Chevalier, Fenzl, Maxim Kolomeets, Roland Rieke, Andrey Chechulin. Christoph Kraus. Cyberattack detection in vehicles using characteristic functions, artificial neural networks, and visual analysis // Informatics and Automation, Vol.20, ¹ 4, pp. 845-868. DOI: 10.15622/ia.20.4.4 . URL: http://dx.doi.org/10.15622/ia.20.4.4. // https://elibrary.ru/item.asp?id=46506073
  4. Maxim Kolomeets, Andrey Chechulin. Analysis of the Malicious Bots Market // Conference of Open Innovations Association, FRUCT. 2021. ¹ 29. Ń. 199-205. DOI: 10.23919/FRUCT52173.2021.9435421 // https://elibrary.ru/item.asp?id=46115513
  5. Maxim Kolomeets, Andrey Chechulin, Igor Kotenko. Bot detection by friends graph in social networks // Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA). Vol.12, ¹ 2 2021. pp. 141-159. DOI: 10.22667/JOWUA.2021.06.30.141. URL: http://isyou.info/jowua/papers/jowua-v12n2-6.pdf. (Scopus, Q2) // https://elibrary.ru/item.asp?id=47517731
  6. Lidia Vitkova, Igor Kotenko, Andrey Chechulin. An approach to ranking the sources of information dissemination in social networks // Information (Switzerland). 2021. Ņ. 12. ¹ 10.Serial number: 416 DOI: 10.3390/info12100416 // https://elibrary.ru/item.asp?id=47516212
  7. Konstantin Izrailov, Polina Zhukovskaya, Pavel Kurta, Andrey Chechulin. Investigation of the method of determination of password resistance to brute force based on an artificial neural network // Ā ńįīšķčźå: Journal of Physics: Conference Series. 13. Ńåš. "13th Multiconference on Control Problems, MCCP 2020" 2021. Ń. 012123. DOI: 10.1088/1742-6596/1864/1/012123 // https://elibrary.ru/item.asp?id=46835342
  8. Yannick Chevalier, Florian Fenzl, Maxim Kolomeets, Roland Rieke, Andrey Chechulin, Christoph Kraus. Cyberattack detection in vehicles using characteristic functions, artificial neural networks, and visual analysis // Informatics and Automation 2021. Vol. 20. ¹ 4. Ń. 845-868. DOI: 10.15622/ia.20.4.4 // https://elibrary.ru/item.asp?id=46506073 (Scopus Q3, RSCI, Ļåšå÷åķü ĀĄŹ, ŠČĶÖ)
  9. Maxim Kolomeets, Olga Tushkanova, Dmitry Levshun, Andrey Chechulin. Camouflaged bot detection using the friend list // Proceedings - 29th Euromicro International Conference on Parallel, Distributed and Network-Based Processing, PDP 2021. 29. 2021. Ń. 253-259. DOI: 10.1109/PDP52278.2021.00048 // https://elibrary.ru/item.asp?id=46047553 (Scopus).
  10. Konstantin Izrailov, Dmitry Levshun, Andrey Chechulin. Vulnerability classification model for Smart City transport infrastructure interfaces. Systems of Control, Communication and Security, 2021, no. 5, pp. 199-223. DOI: 10.24412/2410-9916-2021-5-199-223 // https://elibrary.ru/item.asp?id=47141867 (in Russian).
  11. Igor Kotenko, Maxim Kolomeec, Ksenia Zhernove, Andrey Chechulin. Visual analytics for information security: areas of application, tasks, visualization models // Cybersecurity issues.¹ 4(44). 2021. pp. 2-15. URL: http://dx.doi.org/10.21681/2311-3456-2021-4-2-15 // https://elibrary.ru/item.asp?id=46331128 (in Russian).
  12. Igor Kotenko, Maxim Kolomeec, Ksenia Zhernove, Andrey Chechulin. Visual analytics for information security: efficiency assessment and analysis of visualization methods // Cybersecurity issues. ¹ 6(46). 2021. pp. 36-46. DOI: 10.21681/2311-3456-2021-6-36-45 // https://elibrary.ru/item.asp?id=47327011 (in Russian).
  13. Valeria Popova, Andrey Chechulin. Application of a model for detecting cyberattacks on cyber-physical systems of critical infrastructure nuclear facilities // Informatization and Communications, No.4, 2021. pp. 60-65. DOI: 10.34219/2078-8320-2021-12-4-60-65. // https://elibrary.ru/item.asp?id=46166156 (in Russian).
  14. Andrey Chechulin, Valeria Popova. A model of detecting cyberattacks on cyber-physical systems of critical infrastructure nuclear facilities // Informatization and Communications. 2021. No. 2. pp. 128-133. DOI: 10.34219/2078-8320-2021-12-2-128-133 // https://elibrary.ru/item.asp?id=45571991 (in Russian).
  15. Valeria Popova, Andrey Chechulin. Investigation of the vulnerabilities distribution in the management systems of critical infrastructure // Informatization and Communications. 2021. No. 7. pp. 7-13. DOI: 10.34219/2078-8320-2021-12-7-7-13 // https://elibrary.ru/item.asp?id=47378752 (in Russian).
  16. Maxim Kolomeets, Ksenia Zhernove, Andrey Chechulin. Conceptual model of system-user interface of unmanned vehicle environment in a smart city // XII St. Petersburg Interregional Conference "Information Security of the regions of Russia" (IBRR-2021) p. 86. http://spoisu.ru/files/ibrr/ibrr2021/ibrr2021_materials.pdf. // https://elibrary.ru/item.asp?id=49265527 (in Russian).
  17. Valeria Popova, Andrey Chechulin. Initial events analysis for the safety of nuclear fuel transfer operations // In the collection: Actual problems of infotelecommunications in science and education. collection of scientific articles: in 4 volumes. Saint Petersburg, 2021. pp. 395-399. // https://elibrary.ru/item.asp?id=46545700 (in Russian).
  18. V.O. Popova, A.A. Chechulin. Investigation of the vulnerabilities distribution in the management systems of critical infrastructure // XII St. Petersburg Interregional Conference "Information Security of Russian Regions" (IBRR-2021). 2021. 1. pp. 97-98 http://www.spoisu.ru/files/ibrr/ibrr2021/ibrr2021_materials.pdf // https://elibrary.ru/item.asp?id=49265522 (in Russian).
  19. K.N. Zhernova, A.A. Chechulin. Overview of security threats for modern interfaces // XII St. Petersburg Interregional Conference "Information Security of Russian regions" (IBRR-2021). 2021. T 1. pp. 82-83 http://www.spoisu.ru/files/ibrr/ibrr2021/ibrr2021_materials.pdf // https://elibrary.ru/item.asp?id=49241015 (in Russian).
  20. V.O. Popova, A.A. Chechulin. Investigation of the vulnerabilities distribution in the management systems of critical infrastructure // Ā ńįīšķčźå: Information security of the regions of Russia (IBRR-2021). Materials of the XII St. Petersburg Interregional Conference. Saint Petersburg, 2021. pp. 97-98. // https://elibrary.ru/item.asp?id=49265522 (in Russian).

2020

  1. Dmitry Levshun, Yannick Chevalier, Igor Kotenko, Andrey Chechulin. Design and verification of a mobile robot based on the integrated model of cyber-physical systems // Simulation Modelling Practice and Theory, 2020, Vol. 105, P. 102151. DOI: 10.1016/j.simpat.2020.102151 // https://elibrary.ru/item.asp?id=45422773
  2. Alexey Kashevnik, Andrew Ponomarev, Nikolay Shilov, Andrey Chechulin. In-Vehicle Situation Monitoring for Potential Threats Detection Based on Smartphone Sensors // Sensors 2020, Vol. 20, ¹ 18, P.1-15, DOI: 10.3390/s20185049 // https://elibrary.ru/item.asp?id=45319177 (ŠČĶÖ, Scopus)
  3. Yannick Chevalier, Roland Rieke, Florian Fenzl, Andrey Chechulin, Igor Kotenko. ECU-Secure: Characteristic Functions for In-Vehicle Intrusion Detection // Studies in Computational Intelligence, Vol.868, 2020. P.495-504. DOI: 10.1007/978-3-030-32258-8_58. // https://elibrary.ru/item.asp?id=43205154
  4. Dmitry Levshun, Igor Kotenko, Andrey Chechulin. The Integrated Model of Secure Cyber-Physical Systems for their Design and Verification // Studies in Computational Intelligence. 2020. Ņ. 868. Ń. 333-343. DOI: 10.1007/978-3-030-32258-8_39 // https://elibrary.ru/item.asp?id=43207770
  5. Dmitry Levshun, Diana Gaifulina, Andrey Chechulin and Igor Kotenko. Problematic Issues of Information Security of Cyber-Physical Systems // Informatics and Automation. Vol. 19. No. 5. 2020. P. 1050-1088. ISSN 2078-9181 (2078-9599). DOI: 10.15622/ia.2020.19.5.6. // https://elibrary.ru/item.asp?id=44269284 (in Russian).
  6. Ksenia Zhernova, Maxim Kolomeets, Igor Kotenko, Andrey Chechulin. Adaptive Touch Interface: Application for Mobile Internet Security // Communications in Computer and Information Science (ńģ. ā źķčćąõ). Springer, Singapore, 2020. Vol. 1121. P. 53–72. DOI: 10.1007/978-981-15-9609-4_5 // https://elibrary.ru/item.asp?id=45172903
  7. Dmitry Levshun, Yurii Bakhtin, Andrey Chechulin, Igor Kotenko. Analysis of Attack Actions on the Railway Infrastructure based on the Integrated Model // Communications in Computer and Information Science. Springer, Singapore, 2020. Vol. 1121. P. 145-162. DOI: 10.1007/978-981-15-9609-4_11 // https://elibrary.ru/item.asp?id=45173086
  8. Dmitry Levshun, Igor Kotenko, Andrey Chechulin. The application of the methodology for secure cyber–physical systems design to improve the semi-natural model of the railway infrastructure // Microprocessors and Microsystems. 2020. Ń. 103482. DOI: 10.1016/j.micpro.2020.103482 // https://elibrary.ru/item.asp?id=45110890 (ŠČĶÖ, Scopus)
  9. Lidia Vitkova, Igor Kotenko, Maxim Kolomeets, Olga Tushkanova, Andrey Chechulin. Hybrid Approach for Bots Detection in Social Networks Based on Topological, Textual and Statistical Features // Conference: 4th International Scientific Conference “Intelligent Information Technologies for Industry”At: Ostrava-Prague, Czech Republic. May 2020 // Advances in Intelligent Systems and Computing, Springer. 2020. vol.1156 AISC . P.412-421. DOI:10.1007/978-3-030-50097-9_42 // https://elibrary.ru/item.asp?id=45439091
  10. Diana Gaifulina, Andrey Chechulin. Development of the Complex Algorithm for Web Pages Classification to Detection Inappropriate Information on the Internet // Studies in Computational Intelligence, Vol.868, 2020. P.278-284. DOI:10.1007/978-3-030-32258-8_33 // https://elibrary.ru/item.asp?id=43219502
  11. Maxim Kolomeets, Andrey Chechulin, Ksenia Zhernova, Igor Kotenko, Diana Gaifulina. Augmented reality for visualizing security data for cybernetic and cyberphysical systems // Proceedings-2020 28th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP), March 11-13, 2020, Vasteras, Sweden. P. 421-428. DOI: 10.1109/PDP50117.2020.00071 // https://elibrary.ru/item.asp?id=43284316
  12. Kolomeets Maxim, Levshun Dmitry, Soloviev Sergei, Chechulin Andrey, Kotenko Igor. Social networks bot detection using Benford’s law // Ā ńįīšķčźå: 13th International conference on Security of Information and Networks, SIN 2020. Proceedings of the 13th International Conference on Security of Information and Networks. Virtual, Online, 2020. Ń. 3433589. DOI: 10.1145/3433174.3433589 // https://elibrary.ru/item.asp?id=46743261
  13. Daniel Zelle, Roland Rieke, Christian Plappert, Christoph Kraub, Dmitry Levshun, Andrey Chechulin. SEPAD - security evaluation platform for autonomous driving. Proceedings - 2020 28th Euromicro International Conference on Parallel, Distributed, and Network-Based Processing (PDP-2020) Vesteos, Sweden, March 11-13, 2020. P.413-420. DOI: 10.1109/PDP50117.2020.00070. // https://elibrary.ru/item.asp?id=43293732
  14. Zelle D., Rieke R., Plappert C., Kraus C., Levshun D., Chechulin A. Sepad - security evaluation platform for autonomous driving // Ā ńįīšķčźå: Proceedings - 2020 28th Euromicro International Conference on Parallel, Distributed and Network-Based Processing, PDP 2020. 28. 2020. P. 413-420. 10.1109/PDP50117.2020.00070 // https://elibrary.ru/item.asp?id=43293732
  15. K. Izrailov, A. Chechulin, L. Vitkova. Threats classification method for the transport infrastructure of a smart city // Ā ńįīšķčźå: 14th IEEE International Conference on Application of Information and Communication Technologies, AICT 2020 - Proceedings. 14. 2020. Ń. 9368828. DOI: 10.1109/AICT50176.2020.9368828 // https://www.elibrary.ru/item.asp?id=46760875
  16. Ksenia Zhernova, Maxim Kolomeets, Igor Kotenko, Andrey Chechulin. Use of adaptive touch interface in information security applications // Cybersecurity issues. 2020. No. 1 (35). P. 18-28. DOI: 10.21681/2311-3456-2020-01-18-28 // https://elibrary.ru/item.asp?id=42739002 (in Russian).
  17. Tuan An Pham, Alexey Kashevnik, Andrey Chechulin. Evaluation of facial analysis methods for personalization in driver monitoring systems // Modern science: topical problems of theory and practice. Series: Natural and Technical Sciences. 2020. ¹07. P.154-160. DOI: 10.37882/2223-2966.2020.07.35 // https://www.elibrary.ru/item.asp?id=43971746 (in Russian).
  18. Lidia Vitkova, Andrey Chechulin, Dmitry Saharov. Choosing measures to counter malicious information in social networks // Bulletin of the Voronezh institute of the FPS of Russia. ¹ 3, 2020. P. 20-29. // https://www.elibrary.ru/item.asp?id=44210327 (in Russian).
  19. A. P. Pronichev, A. A. Chechulin, L. A. Vitkova. Approach to management of heterogeneous swarms of devices // Informatization and Communication. 2020. No. 5. pp. 119-124 DOI: 10.34219/2078-8320-2020-11-5-119-124 // https://elibrary.ru/item.asp?id=44544631 (in Russian).
  20. A. A. Chechulin, Yu. E. Bakhtin, A. P. Pronichev. Complex approach to railway infrastructure modeling for security analysis // Methods and technical means of ensuring the security of information. 2020. No. 29. P. 18-19 // https://elibrary.ru/item.asp?id=44017243 (in Russian).
  21. K.E. Izrailov, P.E. Zhukovskaya, P.A. Kurta, A.A.Chechulin. Research of the method for determining the password resistance to brute force on the basis of an artificial neural network // In the collection: Information technologies in management. conference materials. Saint Petersburg, 2020. pp. 273-276. // https://www.elibrary.ru/item.asp?id=44686239 (in Russian).
  22. M. V. Kolomeets, I. V. Kotenko, A. A. Chechulin. Architecture and implementation of visual interfaces for identification and opposition of unwanted, doubtful and harmful information // IX International scientific-technical and scientific-methodological conference "Actual problems of infotelecommunications in science and education" (APINO-2020)". February 26-27, 2020. Collection of scientific articles. 2020. Vol. 1. P. 606-609 // https://elibrary.ru/item.asp?id=44604081 (in Russian).
  23. I. B. Paraschuk, A. A. Chechulin. The essence and content of the task of searching for interface vulnerabilities in the interests of the safe control of unmanned vehicles of the "smart city" // IX International scientific-technical and scientific-methodological conference" Actual problems of infotelecommunications in science and education"(APINO-2020)". February 26-27, 2020. Collection of scientific articles. 2020. Vol. 1. P. 759-763. // https://www.elibrary.ru/item.asp?id=44604113 (in Russian).
  24. V.A. Gavrilyuk, A.A. Chechulin. Multi-step attack analysis algorithm for assessing computer network security // IX International scientific-technical and scientific-methodological conference " Actual problems of infotelecommunications in science and education "(APINO-2020)". February 26-27, 2020. Collection of scientific articles. 2020. Vol. 1. P. 299-302. // https://www.elibrary.ru/item.asp?id=44604016&pff=1 (in Russian).
  25. L.A. Vitkova, K E. Izrailov, A A. Chechulin. Classification of vulnerability of interfaces transport infrastructure of a smart city // IX International scientific-technical and scientific-methodological conference " Actual problems of infotelecommunications in science and education "(APINO-2020)". February 26-27, 2020. Collection of scientific articles. 2020. Vol. 1. P. 253-258. // https://www.elibrary.ru/item.asp?id=44604006&pff=1 (in Russian).
  26. L.A. Vitkova, V.I. Temchenko, A.A. Chechulin. Heuristic traffic analysis methods // IX International scientific-technical and scientific-methodological conference " Actual problems of infotelecommunications in science and education "(APINO-2020)". February 26-27, 2020. Collection of scientific articles. 2020. Vol. 1. P. 261-266. // https://www.elibrary.ru/item.asp?id=44604008&pff=1 (in Russian).
  27. M. V. Kolomeets, A. A. Chechulin Analysis of social networks to identify group malicious and undesirable information activity / / XVII St. Petersburg International Conference " Regional Informatics (RI-2020)", St. Petersburg, Russia, October 28-30, 2020. (in Russian).
  28. I. B. Paraschuk, A. A. Chechulin. Stages of research and building of a safe human-machine interface for a modern intellectual transport environment // XVII St. Petersburg International Conference " Regional Informatics (RI-2020)". St. Petersburg, October 28-30, 2020, part 1., pp. 180-182 http://www.spoisu.ru/files/ri/ri2020/ri2020_materials_1.pdf // https://www.elibrary.ru/item.asp?id=49390774 (in Russian).
  29. K. N. Zhernova, I. V. Kotenko, A. A. Chechulin. Evaluation methodology of gestural interfaces for computer security management // Perspective directions of development of domestic information technologies: materials of the VI interregional scientific and practical conference, Sevastopol, September 22-26, 2020, šš. 219-220. http://www.spoisu.ru/files/pnroit/pnroit-2020_materials.pdf // https://elibrary.ru/item.asp?id=45844820 (in Russian).
  30. I.B. Paraschuk, A.A. Chechulin. Security of the human-machine interface for an intelligent transport environment // Perspective directions of development of domestic information technologies: materials of the VI interregional scientific and practical conference, Sevastopol, September 22-26, 2020, šš. 65-66. http://www.spoisu.ru/files/pnroit/pnroit-2020_materials.pdf // https://www.elibrary.ru/item.asp?id=45844751 (in Russian).
  31. A.A. Chechulin. Scatter plot model for detecting network scan in virtual reality // Perspective directions of development of domestic information technologies: materials of the VI interregional scientific and practical conference, Sevastopol, September 22-26, 2020, šš. 67-68. http://www.spoisu.ru/files/pnroit/pnroit-2020_materials.pdf // https://www.elibrary.ru/item.asp?id=45844752 (in Russian).
  32. A.V. Tishkov, A. A. Strakh, A. A. Branitsky, E. V. Doynikova, A. A. Chechulin. Analysis of correlations between Ammon’s test scales for determination of features for test results forecasting // Perspective directions of development of domestic information technologies: materials of the VI interregional scientific and practical conference, Sevastopol, September 22-26, 2020, šš. 122-123. http://www.spoisu.ru/files/pnroit/pnroit-2020_materials.pdf // https://www.elibrary.ru/item.asp?id=45844771 (in Russian).
  33. V. A. Desnitsky, A. A. Chechulin, E. V. Doynikova. A technique for verification of representation models of wireless sensor networks // Perspective directions of development of domestic information technologies: materials of the VI interregional scientific and practical conference, Sevastopol, September 22-26, 2020, šš. 197-198. http://www.spoisu.ru/files/pnroit/pnroit-2020_materials.pdf https://www.elibrary.ru/item.asp?id=45844808 (in Russian).
  34. E. V. Doynikova, E. V. Chechulin, A.V. Meleshko Extended ontology of metrics for security assessment of industrial Internet of Things systems // Perspective directions of development of domestic information technologies: materials of the VI interregional scientific and practical conference, Sevastopol, September 22-26, 2020, šš. 201-202. http://www.spoisu.ru/files/pnroit/pnroit-2020_materials.pdf // https://www.elibrary.ru/item.asp?id=45844811 (in Russian).
  35. A. A. Chechulin, E. V. Doynikov, V. A. Desnitsky. Model of a stacked pie chart for visual analytics in virtual reality // Perspective directions of development of domestic information technologies: materials of the VI interregional scientific and practical conference, Sevastopol, September 22-26, 2020, pp. 233-234. http://www.spoisu.ru/files/pnroit/pnroit-2020_materials.pdf // https://www.elibrary.ru/item.asp?id=45844827 (in Russian).

2019

  1. Maxim Kolomeets, Andrey Chechulin, and Igor Kotenko. Social networks analysis by graph algorithms on the example of the VKontakte social network // Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 2019, Vol. 10, No. 2, P. 55-75. https://doi.org/10.22667/JOWUA.2019.06.30.055 (Q2, Scopus). // https://elibrary.ru/item.asp?id=41699611
  2. Maxim Kolomeets, Andrey Chechulin, Igor Kotenko, Martin Strecker. Voronoi maps for planar sensor networks visualization // Communications in Computer and Information Science. 2019. Ņ. 971. Ń. 96-109. DOI: 10.1007/978-981-13-3732-1_7 // https://elibrary.ru/item.asp?id=38663581
  3. Anton Pronoza, Lidia Vitkova, Andrey Chechulin, Igor Kotenko. Visual analysis of information dissemination channels in social network for protection against inappropriate content // In book: Proceedings of the Third International Scientific Conference “Intelligent Information Technologies for Industry” (IITI’18). pp.95-105. // Advances in Intelligent Systems and Computing. Vol. 875, 2019. P. 95-105. DOI: 10.1007/978-3-030-01821-4_11 (ńonference materials) // https://elibrary.ru/item.asp?id=38635986
  4. Alexander Branitskiy, Dmitry Levshun, Natalia Krasilnikova, Elena Doynikova, Igor Kotenko, Artem Tishkov, Nina Vanchakova, and Andrey Chechulin. Determination of Young Generation’s Sensitivity to the Destructive Stimuli based on the Information in Social Networks // Journal of Internet Services and Information Security (JISIS), Vol. 9, No. 3, August 2019. P. 1-20. DOI: 10.22667/JISIS.2019.08.31.001 // URL: http://isyou.info/jisis/vol9/no3/jisis-2019-vol9-no3-01.pdf. (Scopus, WoS, SJR=0.18, Q4) // https://elibrary.ru/item.asp?id=41700137
  5. Maxim Kolomeets, Amira Benachour, Didier El Baz, Andrey Chechulin, Martin Strecker, and Igor Kotenko. Reference architecture for social networks graph analysis // Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 2019, Vol. 10, No. 4, P. 109-125. http://isyou.info/jowua/papers/jowua-v10n4-7.pdf (Q2, Scopus), DOI: 10.22667/JOWUA.2019.12.31.109 //https://elibrary.ru/item.asp?id=43235758
  6. Ivo Berger, Roland Rieke, Maxim Kolomeets, Andrey Chechulin, Igor Kotenko. Comparative study of machine learning methods for in-vehicle intrusion detection // Lecture Notes in Computer Science. 2019. Ņ. 11387 LNCS. Ń. 85-101. DOI: 10.1007/978-3-030-12786-2_6 // https://elibrary.ru/item.asp?id=38656424
  7. M. Kolomeets, A. Chechulin, I. Kotenko. Social networks analysis by graph algorithms on the example of the v kontakte social network // Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications. 2019. Ņ. 10. ¹ 2. Ń. 55-75. DOI: 10.22667/JOWUA.2019.06.30.055 // https://elibrary.ru/item.asp?id=41699611
  8. Andrey Chechulin, Igor Kotenko. Application of image classification methods for protection against inappropriate information in the Internet // The 2018 International Conference on Internet of Things and Intelligence Systems (IoTaIS 2018). Bali, Indonesia. 1-3 November, 2018. IEEE Xplore, 2019. P.167-173 DOI: 10.1109/IOTAIS.2018.8600896 // https://elibrary.ru/item.asp?id=38639482
  9. Maxim Kolomeets, Andrey Chechulin, Igor Kotenko, Igor Saenko. Access Control Visualization Using Triangular Matrices // Ā ńįīšķčźå: 2019 27th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP). 2019. Ń. 348-355. DOI: 10.1109/EMPDP.2019.8671578 // https://elibrary.ru/item.asp?id=38327114
  10. Dmitry Levshun, Andrey Chechulin, Igor Kotenko, Yannick Chevalier. Design and verification methodology for secure and distributed cyber-physical systems // 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS), Canary Islands, Spain, 2019. P. 8763814 DOI: 10.1109/NTMS.2019.8763814 // https://elibrary.ru/item.asp?id=41651124
  11. Ilya Afanasyev, Alexander Kolotov, Ruslan Rezin, Konstantin Danilov, Manuel Mazzara, Subham Chakraborty, Alexey Kashevnik, Andrey Chechulin, Aleksandr Kapitonov, Vladimir Jotsov, Andon V. Topalov, Nikola Georgiev Shakev, Sevil Ahmed. Towards Blockchain-based Multi-Agent Robotic Systems: Analysis, Classification and Applications. CoRR abs/1907.07433 (2019). https://arxiv.org/pdf/1907.07433.pdf https://arxiv.org/pdf/1907.07433.pdf https://ieeexplore.ieee.org/document/9073162
  12. Lidia Vitkova, Vasily Desnitsky, Andrey Chechulin, Igor Kotenko. Approach to organizing of a heterogeneous swarm of cyber-physical devices to detect intruders // Ā ńįīšķčźå: IFAC-PapersOnLine. 9th IFAC Conference on Manufacturing Modelling, Management and Control, MIM 2019. 2019. Ń. 945-950. DOI: 10.1016/j.ifacol.2019.11.316 https://www.elibrary.ru/item.asp?id=43243011
  13. Diana Gaifulina, Andrey Chechulin. Development of the Complex Algorithm for Web Pages Classification to Detection Inappropriate Information on the Internet // 13th International Symposium on Intelligent Distributed Computing (IDC 2019), Saint-Petersburg, Russia, 7-9 October 2019.
  14. Dmitry Levshun, Andrey Chechulin, Igor Kotenko. A comprehensive model of secure cyber-physical systems for their design and verification // Proceedings of Educational Institutions of Communication. 2019. Vol. 5, No. 4. P. 114-123. DOI: 10.31854/1813-324X-2019-5-4-114-123 // https://elibrary.ru/item.asp?id=41664180 (in Russian).
  15. Dmitry Levshun, Igor Kotenko, Andrey Chechulin. Technique for design and verification of secure cyber-physical systems // Bulletin of the St. Petersburg State University of Technology and Design. Series 1. Natural and technical sciences. 2019. No. 4. P. 19-22. // https://elibrary.ru/item.asp?id=42485910 (in Russian).
  16. Lidia Vitkova, Andrey Chechulin. Architecture of distributed data collection and processing in monitoring systems social networking // Perspective directions of development of domestic information technologies: materials of the V Interregional scientific and practical conference. Sevastopol, September 24-28, 2019 (collection of conference abstracts) P. 321-323. // https://elibrary.ru/item.asp?id=42944628 (in Russian).
  17. Lidia Vitkova, Andrey Chechulin, Ksenia Naumenko. Monitoring of the agenda in media systems while simultaneously applying task change algorithms // Perspective directions of development of domestic information technologies: materials of the V Interregional scientific and practical conference. Sevastopol, September 24-28, 2019 P. 323-325. // https://elibrary.ru/item.asp?id=42944629 (in Russian).
  18. Ksenia Zhernova, Andrey Chechulin. Data visualization models and algorithms for identification and counteraction of inappropriate information // Perspective directions of development of domestic information technologies: materials of the V Interregional scientific and practical conference. Sevastopol, September 24-28, 2019 P. 325-327. // https://elibrary.ru/item.asp?id=42944630 (in Russian).
  19. Igor Kotenko, Andrey Chechulin, Ksenia Zhernova. Comparison of realizations of gestural interfaces for network security management // Perspective directions of development of domestic information technologies: materials of the V Interregional scientific and practical conference. Sevastopol, September 24-28, 2019 (collection of conference abstracts) P. 329-330. // https://elibrary.ru/item.asp?id=42944632 (in Russian).
  20. L.A. Vitkova, V.A. Desnitsky, K.N. Zhernova, A.A. Chechulin. Review of human-computer interaction for network security // VIII International scientific-technical and scientific-methodological Conference "Actual problems of infotelecommunications in science and education" (APINO 2019). St. Petersburg, February 27-28, 2019 (collection of scientific articles) T. 1, p. 218-223 https://www.sut.ru/doci/nauka/1AEA/APINO/8-APINO%202019.%20Ņ.1.pdf // https://www.elibrary.ru/item.asp?id=41383526 (in Russian).
  21. Nina Vanchakova, Lidia Vitkova, Igor Kotenko, Natalia Krasilnikova, Luvov Strah, Artem Tishkov, Andrey Chechulin. Signs and criteria of personality destructiveness and destructive impact based on Internet content and the behavior of subjects in social networks // VIII International Scientific-Technical and Scientific-Methodological Conference "Actual Problems of Information Telecommunications in Science and Education" (APINO 2019). 2019. V.2, P. 133-138. https://www.sut.ru/doci/nauka/1AEA/APINO/8-APINO%202019.%20Ņ.2.pdf //https://elibrary.ru/item.asp?id=42504986 (in Russian).
  22. Alexander Branitskiy, Lidia Vitkova, Igor Saenko, Andrey Chechulin, Elena Doynikova, Igor Kotenko, Artem Tishkov, Nina Vanchakova. Appying neural networks for predicting the results of the Ammon's test using the profile of social networks // XI St. Petersburg Interregional Conference «Information Security of Russian Regions (ISRR-2019)», October 23-25, 2019, Russia, St. Petersburg. 2019. pp.100-101. http://www.spoisu.ru/files/ibrr/ibrr2019/ibrr2019_materials.pdf // https://www.elibrary.ru/item.asp?id=45839427 (in Russian).
  23. Kristina Valieva, Lidia Vitkova, Andrey Chechulin. Preparatory Processing of Information Objects in the Monitoring Systems of the Internet // VIII International scientific-technical and scientific-methodological Conference "Actual problems of infotelecommunications in science and education" (APINO 2019). St. Petersburg, February 27-28, 2019 (collection of scientific articles) Vol.1. pp. 197-201. https://www.sut.ru/doci/nauka/1AEA/APINO/8-APINO%202019.%20Ņ.1.pdf // https://elibrary.ru/item.asp?id=41383521 (in Russian).
  24. Lidia Vitkova, Anna Kuraeva, Anton Pronoza, Andrey Chechulin. Analysis of Methods of Identification and Evaluation Pages of Opinion Leaders in Social Networks // VIII International scientific-technical and scientific-methodological Conference "Actual problems of infotelecommunications in science and education" (APINO 2019). St. Petersburg, February 27-28, 2019 (collection of scientific articles) Vol.1. pp. 233-237. https://www.sut.ru/doci/nauka/1AEA/APINO/8-APINO%202019.%20Ņ.1.pdf // https://elibrary.ru/item.asp?id=41383529 (in Russian).
  25. Ksenia Zhernova, Andrey Chechulin. Data visualization models and algorithms for identification and counteraction of inappropriate information // The V interregional scientific and practical conference "Perspective directions of development of domestic information technologies". September 24-28, 2019, Russia, Sevastopol. pp. 325-327. // https://elibrary.ru/item.asp?id=42944630 (in Russian).
  26. Ksenia Zhernova, Maxim Kolomeets, Andrey Chechulin. Review of Human-machine Interaction Methods in Systems for Counteracting Doubtful and Undesirable Information. // VIII International scientific-technical and scientific-methodological Conference "Actual problems of infotelecommunications in science and education" (APINO 2019). St. Petersburg, February 27-28, 2019 (collection of scientific articles) Vol. 1. pp. 449-454. https://www.sut.ru/doci/nauka/1AEA/APINO/8-APINO%202019.%20Ņ.1.pdf // https://elibrary.ru/item.asp?id=41383572 (in Russian).
  27. Daria Starodubova, Alexey Malko, Andrey Chechulin. The Research about the Protection of Computer Networks from Reconnaissance Attacks // VIII International scientific-technical and scientific-methodological Conference "Actual problems of infotelecommunications in science and education" (APINO 2019). St. Petersburg, February 27-28, 2019 (collection of scientific articles) Vol. 1. pp. 674-677. https://www.sut.ru/doci/nauka/1AEA/APINO/8-APINO%202019.%20Ņ.1.pdf // https://elibrary.ru/item.asp?id=41383618 (in Russian).
  28. Alexey Malko, Daria Starodubova, Andrey Chechulin. The Research of Methods and Algorithms of Collection Information in a Computer Network // VIII International scientific-technical and scientific-methodological Conference "Actual problems of infotelecommunications in science and education" (APINO 2019). St. Petersburg, February 27-28, 2019 (collection of scientific articles) Vol. 1. pp. 677-681. https://www.sut.ru/doci/nauka/1AEA/APINO/8-APINO%202019.%20Ņ.1.pdf // https://www.elibrary.ru/item.asp?edn=lkfkfj (in Russian).
  29. Alexander Branitskiy, Elena Doynikova, Veronika Kuzmina, Igor Saenko, Andrey Chechulin. Analysis of CVSS Metrics System in Order to Develop Attack Graph Algorithm // VIII International scientific-technical and scientific-methodological Conference "Actual problems of infotelecommunications in science and education" (APINO 2019). St. Petersburg, February 27-28, 2019 (collection of scientific articles) Vol. 1. pp. 167-172. https://www.sut.ru/doci/nauka/1AEA/APINO/8-APINO%202019.%20Ņ.1.pdf // https://www.elibrary.ru/item.asp?id=41383515 (in Russian).
  30. Diana Gaifulina, Elvira Khakimova, Andrey Chechulin. Development of a complex algorithm for websites classification to detect inappropriate content on the Internet // VIII International scientific-technical and scientific-methodological Conference "Actual problems of infotelecommunications in science and education" (APINO 2019). St. Petersburg, February 27-28, 2019 (collection of scientific articles) Vol.1. pp.312-317. https://www.sut.ru/doci/nauka/1AEA/APINO/8-APINO%202019.%20Ņ.1.pdf // https://elibrary.ru/item.asp?id=41383544 (in Russian).
  31. Dmitry Levshun, Andrey Chechulin. The aspects of the verification of secure cyberphysical systems // XI Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2019)". October 23-25, 2019. Proceedings of the conference. P. 133-134. http://www.spoisu.ru/files/ibrr/ibrr2019/ibrr2019_materials.pdf // https://elibrary.ru/item.asp?id=46478813 (in Russian).
  32. V.A. Gavrilyuk, A.A. Chechulin. Analysis of trends of informational threats and vulnerabilities // In the collection: Actual problems of infotelecommunications in science and education (APINO 2019). collection of scientific articles of the VIII International Scientific-technical and Scientific-methodological Conference: in 4 t.. 2019. pp. 307-311. // https://elibrary.ru/item.asp?id=41383543&pff=1 (in Russian).
  33. D.A. Gayfulina, E.R. Khavanskaya, A.A. Chechulin. Development of a complex algorithm for websites classification to detect inappropriate content on the internet // In the collection: Actual problems of infotelecommunications in science and education (APINO 2019). collection of scientific articles of the VIII International Scientific-Technical and Scientific-methodological Conference : in 4 t.. 2019. pp. 312-317. // https://elibrary.ru/item.asp?id=41383544 (in Russian).
  34. M.V. Kolomeets, A.A. Chechulin. Models and algorithms for the implementation of visual interfaces to identify and counter undesirable, questionable and harmful information // In the collection: Actual problems of infotelecommunications in science and education (APINO 2019). collection of scientific articles of the VIII International Scientific-Technical and Scientific-methodological Conference: in 4 t.. 2019. pp. 547-551 // https://elibrary.ru/item.asp?id=41383592 (in Russian).
  35. Lidia Vitkova, Andrey Chechulin, Dmitry Sakharov, Anton Pronoza. On the issue of the information sphere security in the context of information warfare // All-Russian Scientific Conference of Young Scientists "Innovations in Youth Science", 2018, p. 59. (in Russian).

2018

  1. Igor Kotenko, Andrey Fedorchenko, Elena Doynikova, Andrey Chechulin. An Ontology-based Hybrid Storage of Security Information // Information Technology and Control. 2018. Ņ. 47. ¹ 4. Ń. 655-667 DOI: 10.5755/j01.itc.47.4.20007 // https://elibrary.ru/item.asp?id=37282133
  2. Maxim Kolomeets, Andrey Chechulin, Igor Kotenko, Yannick Chevalier. A visual analytics approach for the cyber forensics based on different views of the network traffic // Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 2018, Vol. 9, No. 2, P. 57-73. (Q3, Scopus) // https://elibrary.ru/item.asp?id=38663593
  3. Andrey Chechulin, Maxim Kolomeec, Igor Kotenko. Visual analytics for improving efficiency of network forensics: account theft investigation // Ā ńįīšķčźå: Journal of Physics: Conference Series. 3. Ńåš. "3rd Annual International Conference on Information System and Artificial Intelligence, ISAI 2018" 2018. Ń. 012062. DOI: 10.1088/1742-6596/1069/1/012062. (Q3, WoS and Scopus) // https://www.elibrary.ru/item.asp?id=35737385
  4. Igor Kotenko, Andrey Chechulin, Mikhail Bulgakov. Intelligent Security Analysis of Railway Transport Infrastructure Components on the base of Analytical Modeling // Advances in Intelligent Systems and Computing. 2018. Ņ. 680. Ń. 178-188. DOI: 10.1007/978-3-319-68324-9_20 // https://elibrary.ru/item.asp?id=31113435 (WoS and Scopus).
  5. Maxim Kolomeec, Andrey Chechulin, Igor Kotenko. Visual analysis of CAN bus traffic injection using radial bar charts // Proceedings - 2018 IEEE Industrial Cyber-Physical Systems, ICPS 2018. 1. 2018. Ń. 841-846. DOI: 10.1109/ICPHYS.2018.8390816, https://ieeexplore.ieee.org/abstract/document/8390816/ (WoS and Scopus) // https://elibrary.ru/item.asp?id=35768985
  6. Dmitry Levshun, Andrey Chechulin, Igor Kotenko. A Technique for Design of Secure Data Transfer Environment: Application for I2C Protocol // Proceedings - 2018 IEEE Industrial Cyber-Physical Systems, ICPS 2018. 1. 2018. Ń. 789-794. DOI: 10.1109/ICPHYS.2018.8390807. https://ieeexplore.ieee.org/document/8390807 // https://elibrary.ru/item.asp?id=35757740
  7. Igor Kotenko, Igor Saenko, Andrey Chechulin, Vasily Desnitsky, Lidia Vitkova, Anton Pronoza. Monitoring and counteraction to malicious influences in the information space of social networks // Ā ńįīšķčźå: 10th International Conference on Social Informatics (SocInfo). 2018. Ń. 159-167. DOI: 10.1007/978-3-030-01159-8_15 // https://elibrary.ru/item.asp?id=35677138
  8. Dmitry Levshun, Yannick Chevalier, Igor Kotenko, Andrey Chechulin. Secure Communication in Cyber-Physical Systems // The 3rd International Symposium on Mobile Internet Security (MobiSec 2018). Cebu, Philippines, August 29-September 1, 2018. 9 p. http://isyou.info/conf/mobisec18/mobisec18-book-ver1.pdf.
  9. Maxim Kalameyets, Andrey Chechulin, Igor Kotenko. The technique of structuring social network graphs for visual analysis of user groups to counter inappropriate, dubious and harmful information // 2nd International Scientific-Practical Conference Fuzzy Technologies in the Industry (FTI 2018), October 23-25, 2018, Ulyanovsk, Russia, P.87-95 http://ceur-ws.org/Vol-2258/paper12.pdf // https://elibrary.ru/item.asp?id=37534866
  10. Anton Pronoza, LidiaVitkova, Andrey Chechulin, Igor Kotenko, Dmitry Saharov. Methodology for disseminating information channels analysis in social networks // Vestnik of Saint-Petersburg University applied mathematics. Computer science. Control processes, 2018. Vol.14, ¹ 4, P.362-377 DOI: 10.21638/11702/spbu10.2018.409 // https://elibrary.ru/item.asp?id=36687364 (in Russian).
  11. Maxim Kolomeec, Andrey Chechulin, Elena Doynikova, Igor Kotenko. A technique of visualization of cybersecurity metrics // Journal of Instrument Engineering. 2018. Vol.61.No.10.P.873-880. DOI: 10.17586/0021-3454-2018-61-10-873-880 https://cyberleninka.ru/article/n/metodika-vizualizatsii-metrik-kiberbezopasnosti // https://elibrary.ru/item.asp?id=36408681 (in Russian).
  12. Igor Kotenko,Dmitry Levshun, Andrey Chechulin, Igor Ushakov, Andrey Krasov. An Integrated Approach to Provide Security of Cyber-Physical Systems Based on Microcontrollers // Cybersecurity issues.2018. No.3 (27) P.29 38. DOI: 10.21681/2311-3456-2018-3-29-38 // https://elibrary.ru/item.asp?id=36609968 (in Russian).
  13. Maxim Kolomeec, Igor Kotenko, Andrey Chechulin. Visual Analytics for Detecting Attacks in Vehicle`s CAN Bus Traffic // Information Security. Inside. 2018. No.3(81). P.51-57 // https://elibrary.ru/item.asp?id=35097115 (in Russian).
  14. Dmitry Levshun, Andrey Chechulin, Igor Kotenko. Design of Secure Data Transfer Environment Using the I2C Protocol as an Example // Information Security. Inside. 2018. No.4(82). P.54-62 // https://elibrary.ru/item.asp?id=35510042 (in Russian).
  15. Igor Saenko, Andrey Chechulin, Lidia Vitkova. The intelligent systems concept of analytical processing of digital network content in order to detect unwanted information // Methods and technical means of ensuring information security. 2018. No. 27. pp. 6-7. // https://elibrary.ru/item.asp?id=36546890 (in Russian).
  16. I.V. Kotenko, A.A. Chechulin, D.S. Levshun Modeling of railway transport infrastructure security monitoring systems // Transport security and technologies-2018. No.1 - P. 62-64 https://www.securitymedia.ru/issue_transport_issue_0_58.html (in Russian).
  17. Elvira Hakimova, Andrey Chechulin. Protection technique against inappropriate information in the Internet network for children with disabilities // Proceedings of the conference "Information technologies in management" (ITU-2018). St. Petersburg. October 2-4, 2018. SPb.: Concern Central Research Institute Electropribor JSC, 2018, P. 418-427 // https://elibrary.ru/item.asp?id=37028990 (in Russian).
  18. Igor Parashchuk, Igor Kotenko, Igor Saenko, Andrey Chechulin. Key architectural decisions on creation of intelligent system of analytical processing of digital network content for the benefit of protection against inappropriate information // XVI Anniversary Saint-Petersburg International Conference "Regional informatics-2018 (RI-2018)". St. Petersburg, Russia. October 24-26, 2018. Proceedings. P. 151-152. http://www.spoisu.ru/files/ri/ri2018/ri2018_materials.pdf // https://elibrary.ru/item.asp?id=36349218 (in Russian).
  19. Igor Kotenko, Igor Saenko, Andrey Chechulin. Conceptual model of functioning of intelligent system of analytical processing of digital network content for the benefit of detection and counteraction of inappropriate, dubious and harmful information // XVI Anniversary Saint-Petersburg International Conference "Regional informatics-2018 (RI-2018)". St. Petersburg, Russia. October 24-26, 2018. Proceedings. P. 153-154. http://www.spoisu.ru/files/ri/ri2018/ri2018_materials.pdf // https://elibrary.ru/item.asp?id=41285896 (in Russian).
  20. Elvira Khakimova, Andrey Chechulin. Analysis of sources and types of unwanted information in the internet // XVI Anniversary Saint-Petersburg International Conference "Regional informatics-2018 (RI-2018)". St. Petersburg, Russia. October 24-26, 2018. Proceedings. P. 172-173. http://www.spoisu.ru/files/ri/ri2018/ri2018_materials.pdf // https://elibrary.ru/item.asp?id=46484156&pff=1 (in Russian).
  21. Andrey Chechulin, Maxim Kolomeets. Sources of security data for hybrid repository construction // XVI Anniversary Saint-Petersburg International Conference "Regional informatics-2018 (RI-2018)". St. Petersburg, Russia. October 24-26, 2018. Proceedings. P. 175-176. http://www.spoisu.ru/files/ri/ri2018/ri2018_materials.pdf // https://elibrary.ru/item.asp?id=46484186 (in Russian).
  22. Maxim Kolomeec, Andrey Chechulin, Igor Kotenko. Computer-human interaction techniques for improving the effectiveness of decision-making processes in information security // Actual problems of informational communication in science and education (ĄPINO 2018). VII International technical science and methodical science conference. Compilation of papers. In 4 volumes. Edited by S.V. Bachevskiy. 2018. Vol. 1. P. 479-483. https://www.sut.ru/doci/nauka/7apino/Sb_APINO%202018_Ņ_1.pdf // https://elibrary.ru/item.asp?id=35231618 (in Russian).
  23. Lidia Vitkova, Anton Pronoza, Dmitry Saharov, Andrey Chechulin. Security problems of the information sphere in the conditions of information warfare // Actual problems of informational communication in science and education (ĄPINO 2018). VII International technical science and methodical science conference. Compilation of papers. In 4 volumes. Edited by S.V. Bachevskiy. 2018. Volume 1. P. 191-195.// https://elibrary.ru/item.asp?id=35231553&pff=1 (in Russian).
  24. Yurii Bahtin, Andrey Chechulin. Security analysis of the security and fire alarm system devices interaction protocol // Perspective directions of development of domestic information technologies: materials of the IV interregional scientific and practical conference. Sevastopol, September 18-22, 2018. P. 231-232. https://elibrary.ru/download/elibrary_36570166_67404611.pdf // https://elibrary.ru/item.asp?id=36570166 (in Russian).

2017

  1. Igor Kotenko, Andrey Chechulin, Dmitry Komashinsky. Categorisation of web pages for protection against inappropriate content in the internet. International Journal of Internet Protocol Technology (IJIPT), Vol. 10, No. 1, 2017. P.61-71. DOI: 10.1504/IJIPT.2017.083038 // https://www.elibrary.ru/item.asp?id=29485945
  2. Igor Kotenko, Andrey Chechulin, Alexander Branitskiy. Generation of Source Data for Experiments with Network Attack Detection Software // Journal of Physics: Conference Series. 2017. Ņ. 820. ¹ 1. Ń. 012033. DOI: 10.1088/1742-6596/820/1/012033 // https://elibrary.ru/item.asp?id=29483273
  3. Igor Kotenko, Igor Saenko and Andrey Chechulin. Protection against information in eSociety: using Data Mining methods to counteract unwanted and malicious data // Communications in Computer and Information Science. 2017. Ņ. 745. Ń. 170-184. DOI: 10.1007/978-3-319-69784-0_15 // https://elibrary.ru/item.asp?id=31040301 (WoS and Scopus)
  4. Igor Kotenko, Andrey Chechulin, Elena Doynikova, Andrey Fedorchenko. Ontological hybrid storage for security data // Studies in Computational Intelligence. 2017. Ņ. 737. Ń. 159-171. DOI: 10.1007/978-3-319-66379-1_15 // https://elibrary.ru/item.asp?id=31065783
  5. Maxim Kolomeec, Gustavo Gonzalez-Granadillo, Elena Doynikova, Andrey Chechulin, Igor Kotenko, and Herve Debar. Choosing models for security metrics visualization // Lecture Notes in Computer Science. 2017. Ņ. 10446 LNCS. Š. 75-87. DOI: 10.1007/978-3-319-65127-9_7 // https://elibrary.ru/item.asp?id=31066510
  6. Andrey Fedorchenko, Igor Kotenko, Elena Doynikova, Andrey Chechulin. The ontological approach application for construction of the hybrid security repository // XX International Conference on Soft Computing and Measurements (SCM'2017), Saint-Petersburg, May 24-26, 2017 P.525-528. DOI: 10.1109/SCM.2017.7970638 // https://elibrary.ru/item.asp?id=31048917
  7. Dmitry Levshun, Andrey Chechulin, Igor Kotenko. Design Lifecycle for Secure Cyber-Physical Systems based on Embedded Devices // Proceedings of the 2017 IEEE 9th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, IDAACS 2017. 9. 2017. Ń. 277-282. DOI: 10.1109/IDAACS.2017.8095090 // https://elibrary.ru/item.asp?id=35530497
  8. Elena Doynikova, Andrey Chechulin, and Igor Kotenko. Analytical Attack Modeling and Security Assessment based on the Common Vulnerability Scoring System // Conference of Open Innovation Association, FRUCT. Proceedings of the 20th Conference of Open Innovations Association, FRUCT 2017. 2017. Ń. 53-61. DOI: 10.23919/FRUCT.2017.8071292 // https://elibrary.ru/item.asp?id=35517447
  9. Dmitry Levshun, Andrey Chechulin. Development of the information search interface in unified repository of multimedia data from field ethnographic expeditions // Universum: Technical science: digital science journal. 2017. ¹ 4(37). P. 15-21. https://7universum.com/ru/tech/archive/item/4623 // https://elibrary.ru/item.asp?id=29039410 (in Russian).
  10. Dmitry Levshun, Andrey Chechulin, Igor Kotenko. Design lifecycle for secure cyber-physical systems based on embedded devices. Information Security. Inside, ¹4(76), 2017. P.53-59. // https://elibrary.ru/item.asp?id=29966169 (in Russian).
  11. Maxim Kolomeec, Igor Kotenko, Andrey Chechulin. Using virtual and augmented reality for cyber security data visualization. Information Security. Inside, ¹5(77), 2017. P.58-63 // https://elibrary.ru/item.asp?id=30268269 (in Russian).
  12. Igor Kotenko, Andrey Chechulin, Dmitry Levshun. Security analysis of railway transport infrastructure on the base of analytical modeling. Information Security. Inside, ¹6(78), 2017. P.48-57. // https://elibrary.ru/item.asp?id=30585609 (in Russian).
  13. Elena Doynikova, Andrey Chechulin and Igor Kotenko. Computer network security evaluation based on CVSS metrics // Information and Control Systems, 2017, No. 6(91). pp. 76-87. DOI: 10.15217/issn1684-8853.2017.6.76 // https://elibrary.ru/item.asp?id=30794562 (in Russian).
  14. Andrey Fedorchenko, Igor Kotenko, Elena Doynikova, Andrey Chechulin. The ontological approach application for the construction of the hybrid security repository. XX International Conference on Soft Computing and Measurements (SCM'2017), Proceedings. Saint-Petersburg, ETU "LETI", 2017. Vol. 2, P.55-58. https://elibrary.ru/download/elibrary_29902198_57102181.pdf // https://elibrary.ru/item.asp?id=29902198 (in Russian).
  15. Nikolai Vasilishin, Nikita Dubrovin, Igor Ushakov, Andrey Chechulin. Techniques for network traffic gathering and analysis based on big data technologies // VI International Conference on Advanced Info-Telecommunication (ICAIT 2017). 01-02 March 2017. Conference proceedings. St. Petersburg., 2017. Vol. 2. P. 127-131. https://www.sut.ru/doci/nauka/6apino/apino2017-2.pdf // https://elibrary.ru/item.asp?id=32578103 (in Russian).
  16. Mikhail Vikhrov, Andrey Fedorchenko, and Andrey Chechulin. Approaches for rules representations for security events correlation in cyber-physical systems // VI International Conference on Advanced Info-Telecommunication (ICAIT 2017). March 1-2, 2017. Proceedings. Vol. 2 pp.175-179. https://www.sut.ru/doci/nauka/6apino/apino2017-2.pdf // https://elibrary.ru/item.asp?id=32578124&pff=1 (in Russian).
  17. Andrey Fedorchenko, Elena Doynikova, and Andrey Chechulin. Analysis of the security data and their specifications for the security information and event management systems // VI International Conference on Advanced Info-Telecommunication (ICAIT 2017). March 1-2, 2017. Proceedings, Vol. 3. Š. 209-214 https://www.sut.ru/doci/nauka/6apino/apino2017-3.pdf // https://www.elibrary.ru/item.asp?id=32650671 (in Russian).
  18. I.B. Saenko, A.G. Kushnerevich, I.V. Kotenko, A.A. Chechulin. An approach to creation of program system of the distributed parallel processing of data bulks about security events on the computer network // VI International Conference on Advanced Info-Telecommunication (ICAIT 2017). March 1-2, 2017. Conference proceedings. Saint-Petersburg, 2017. Vol. 3 pp. 286-291 https://www.sut.ru/doci/nauka/6apino/apino2017-3.pdf // https://elibrary.ru/item.asp?id=32650689 (in Russian).
  19. Andrey Chechulin, Andrey Kotenko. Modeling cyber-physical attacks and producing countermeasures in a mode near to real-time // International congress IS&IT – International Conference on Artificial Intelligence and Systems. Proceedings. Divnomorskoye, Russia. September 2-9, 2017. Vol. 2. pp. 271-276. (in Russian).
  20. Andrey Fedorchenko, Andrey Chechulin, and Elena Doynikova. Security event formats in logging system of OS Windows // Regional informatics and information security. 2017. pp. 257-259. http://www.spoisu.ru/files/riib/riib_4_2017.pdf // https://www.elibrary.ru/item.asp?id=35276215 (in Russian).
  21. Maxim Kolomeec, Andrey Chechulin. Application of new visualization models to improve the effectiveness of user-made solutions // X St. Petersburg Interregional Conference "Information Security of the regions of Russia" (IBRR-2017). November 1-3, 2017.Proceedings. Issue 4. St. Petersburg: SPOISU P. 466-468. http://www.spoisu.ru/files/riib/riib_4_2017.pdf // https://elibrary.ru/item.asp?id=35276283 (in Russian).
  22. Anton Pronoza, Ekaterina Ļšīķīēą, Andrey Chechulin, Igor Kotenko. Automatic detection of difference between the interests of social network users of depending on their cognitive functions // X St. Petersburg Interregional Conference "Information Security of the regions of Russia" (IBRR-2017). November 1-3, 2017.Proceedings. Issue 4. St. Petersburg: SPOISU P. 261-263. http://www.spoisu.ru/files/riib/riib_4_2017.pdf // https://elibrary.ru/item.asp?id=35276217 (in Russian).
  23. Anton Pronoza, Andrey Chechulin, Nikolay Komashinsky. Security threats in social networks and protection from information // X St. Petersburg Interregional Conference "Information Security of the regions of Russia" (IBRR-2017). November 1-3, 2017.Proceedings. Issue 4. St. Petersburg: SPOISU P. 259-261. http://www.spoisu.ru/files/riib/riib_4_2017.pdf // https://www.elibrary.ru/item.asp?id=35276216 (in Russian).
  24. Andrey Fedorchenko, Elena Doynikova, Igor Kotenko, and Andrey Chechulin. Analysis of security events properties for correlation process for siem-systems // The All-Russian Forum "The System of Distributed Situation Centers as the Basis for Digital Transformation of Public Administration" (SDSC-2017). 2017. Š. 199-201 (in Russian).
  25. Elena Doynikova, Andrey Fedorchenko, and Andrey Chechulin. Features of ontological approach application for the integration of security information. The All-Russian Forum "The System of Distributed Situation Centers as the Basis for Digital Transformation of Public Administration" (SDSC-2017). 2017. Š. 150-152 (in Russian).
  26. Anton Pronoza, Andrey Chechulin. Research of individual interests of senior classes pupils in social networks in order to prevent their participation in unlawful activities. The All-Russian Forum "The System of Distributed Situation Centers as the Basis for Digital Transformation of Public Administration" (SDSC-2017). 2017. Š. 192-194 (in Russian).
  27. Andrey Chechulin, Elena Doynikova, and Andrey Fedorchenko. An approach for information security repository construction and application. The All-Russian Forum "The System of Distributed Situation Centers as the Basis for Digital Transformation of Public Administration" (SDSC-2017). 2017. Š. 209-211 (in Russian).
  28. Andrey Chechulin. Graphical models for visualization of securitu metrics in a computer network. XIX scientific-practical conference «RusCrypto’2017». Moscow Region, Solnechnogorsk, March 22-24, 2017. http://www.ruscrypto.ru/. (in Russian).

2016

  1. Dmitry Novozhilov, Igor Kotenko and Andrey Chechulin. Improving the Categorization of Web Sites by Analysis of Html-Tags Statistics to Block Inappropriate Content // Studies in Computational Intelligence. 2016. Ņ. 616. Ń. 257-263. DOI: 10.1007/978-3-319-25017-5_24 // https://elibrary.ru/item.asp?id=24934708
  2. Maxim Kolomeec, Andrey Chechulin, Anton Pronoza, and Igor Kotenko. Technique of Data Visualization: Example of Network Topology Display for Security Monitoring // Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications. 2016. Ņ. 7. ¹ 1. Ń. 58-78. http://isyou.info/jowua/papers/jowua-v7n1-4.pdf DOI: 10.22667/JOWUA.2016.03.31.058 // https://elibrary.ru/item.asp?id=27150813
  3. Vasily Desnitsky, Dmitry Levshun, Andrey Chechulin and Igor Kotenko. Design Technique for Secure Embedded Devices: Application for Creation of Integrated Cyber-Physical Security System// Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), June, 2016 Vol.7, No.2, P.60-80. http://isyou.info/jowua/papers/jowua-v7n2-4.pdf DOI: 10.22667/JOWUA.2016.06.31.060 // https://elibrary.ru/item.asp?id=27036091
  4. Igor Kotenko, Dmitry Levshun, Andrey Chechulin. Event correlation in the integrated cyber-physical security system // The 2016 XIX IEEE International Conference on Soft Computing and Measurements (SCM-2016), IEEE, St. Petersburg, Russia, May 2016 P.484-486. DOI: 10.1109/SCM.2016.7519820 // https://elibrary.ru/item.asp?id=27589708
  5. Maxim Kolomeets, Andrey Chechulin, Igor Kotenko. Visualization Model for Monitoring of Computer Networks Security Based on the Analogue of Voronoi Diagrams // Lecture Notes in Computer Science. 2016. Ņ. 9817. Ń. 141-157. DOI: 10.1007/978-3-319-45507-5_10 // https://elibrary.ru/item.asp?id=27569647
  6. Vasily Desnitsky, Andrey Chechulin, Igor Kotenko, Dmitry Levshun, Maxim Kolomeec. Application of a Technique for Secure Embedded Device Design Based on Combining Security Components for Creation of a Perimeter Protection System // 24th Euromicro International Conference on Parallel, Distributed, and Network-Based Processing (PDP 2016). Heraklion, Crete,2016 February 17-19. IEEE Computer Society P.609-616. DOI: 10.1109/PDP.2016.99 // https://elibrary.ru/item.asp?id=27160200
  7. Anton Pronoza, Andrey Chechulin, Igor Kotenko. Mathematical Models of Visualization in SIEM Systems // SPIIRAS Proceedings. 2016. Issue 3(46). P.90-107. DOI: 10.15622/sp.46.8 https://elibrary.ru/download/elibrary_26498850_30177438.pdf // https://elibrary.ru/item.asp?id=26498850 (in Russian).
  8. Andrey Chechulin. The main types of the network changes that should be taken into account during the construction of an analytical attack models // Journal "Methods and technical means of ensuring information security" No. 25. pp.113-114. // https://elibrary.ru/item.asp?id=36546805 (in Russian).
  9. Andrey Fedorchenko, Dmitry Levshun, Andrey Chechulin, Igor Kotenko. An Analysis of Security Event Correlation Techniques in Siem-Systems. Part 1. SPIIRAS Proceedings. 2016. Issue 4(47). P.5-27. DOI: 10.15622/sp.47.1 http://ia.spcras.ru/index.php/sp/article/view/3366/1950 // https://elibrary.ru/item.asp?id=26498862 (in Russian).
  10. Maxim Kolomeec, Andrey Chechulin, Igor Kotenko. Technique of visualization of computer network topology for monitoring of information security // PJournal of Instrument Engineering. Vol.59, ¹ 10, 2016. P.807-812. DOI 10.17586/0021-3454-2016-59-10-807-812 // https://elibrary.ru/item.asp?id=27170903 (in Russian).
  11. Vasily Desnitsky, Andrey Chechulin, Igor Kotenko, Dmitry Levshun, Maxim Kolomeec. Combined Design Technique for Secure Embedded Devices Exemplified by a Perimeter Protection System // SPIIRAS Proceedings. 2016. Issue 48. P.5-31. DOI: 10.15622/sp.48.1 // https://elibrary.ru/item.asp?id=27177922 (in Russian).
  12. Dmitry Levshun, Andrey Chechulin. Mathematical model for description of information objects of different types to organize the search of materials in a unified repository of multimedia data from field ethnographic expeditions // Innovations in science. 2016. No. 11 (60). pp. 21-29. // https://elibrary.ru/item.asp?id=27448577 (in Russian).
  13. Mikhail Mikhailov, Maxim Kolomeec, Mikhail Bulgakov, Andrey Chechulin. Investigation and determination of general advantages and disadvantages of existing data warehouses types and analysis of applications // Technical sciences - from theory to practice. 2016. No. 11 (59). pp. 22-27. // https://elibrary.ru/item.asp?id=27450833 (in Russian).
  14. Andrey Fedorchenko, Dmitry Levshun, Andrey Chechulin, Igor Kotenko. An Analysis of Security Event Correlation Techniques in Siem-Systems. Part 2 // SPIIRAS Proceedings. 2016. Issue 6(49). P.5-27. DOI: 10.15622/sp.49.11 // https://elibrary.ru/item.asp?id=27657130 (in Russian).
  15. Dmitry Novozhilov, Andrey Chechulin, Igor Kotenko. Improving website categorization based on HTML tag statistics for blocking unwanted content // Management-information systems, 2016. No 6(85), P.65-73. DOI: 10.15217/issn1684-8853.2016.6.65 // https://elibrary.ru/item.asp?id=27536576 (in Russian).
  16. Andrey Chechulin, Maxim Kolomeec, Igor Kotenko, Sergey Busuev. Architecture of software prototype of heterogeneous data visualization system // Mathematical methods in engineering and technology - MMTT. 2016. No. 8 (90). pp. 142-144 // https://www.elibrary.ru/item.asp?id=28417712 (in Russian).
  17. Dmitry Levshun, Andrey Chechulin, Igor Kotenko. Architecture of integrated security system // Journal "Methods and technical means of information security" No. 25. pp.53-54. // https://elibrary.ru/item.asp?id=36546762 (in Russian).
  18. Andrey Chechulin, Maxim Kolomeec. Application of new visualization techniques for security metrics of computer networks. 18th International Conference “RusCrypto” on Cryptology, Steganography, Digital Signature and Security Systems. Solnechnogorsk, Russia. March 22-25, 2016. https://docplayer.ru/61888797-Primenenie-novyh-metodov-vizualizacii-dlya-otobrazheniya-metrik-bezopasnosti-kompyuternoy-seti.html (in Russian).
  19. Igor Kotenko, Dmitry Levshun, Andrey Chechulin, Sergey Bushuev. Event correlation in the integrated cyber-physical security system. XIX International Conference on Soft Computing and Measurements (SCM'2016),Proceedings. Vol. 2, Saint-Petersburg, ETU "LETI". P.327-331. // https://elibrary.ru/item.asp?id=27187695 (in Russian).
  20. Maxim Kolomeec, Andrey Chechulin. Development of new graphical models for networks visualization. 6th international forum on practical security Positive Hack Days. Moscow, Russia. May 17-18, 2016. http://www.phdays.ru/ (in Russian).
  21. Andrey Chechulin, Dmitry Novozhilov. Development of a test bed for the efficiency evaluation of intellectual methods for websites classification // International congress "IS&IT16" - International Conference on Artificial Intelligence and Systems. Proceedings. Divnomorskoye, Russia. September 4-11. Taganrog, UFY, 2016. Vol. 2. P.32-37. (in Russian).
  22. Evgenia Deshevih, Igor Ushakov, Andrey Chechulin. Integration of SIEM systems with security event correlation systems based on Big Data technology // 9th Conference on Information Technologies in Control (ITC) . Proceedings. St.Petersburg, Russia. 2016, October 4–6, P.684-687. // https://elibrary.ru/item.asp?id=27559698 (in Russian).
  23. Dmitry Novozhilov, Andrey Chechulin. Development of the platform for experiments with the websites classification methods // 9th Conference on Information Technologies in Control (ITC) . Proceedings. St.Petersburg, Russia. October 4–6, 2016. P.740-749. // https://elibrary.ru/item.asp?id=27559706 (in Russian).
  24. Anton Pronoza, Andrey Chechulin, Ian Kopchak. Approach for network security visualization evaluation based on ratio of informativity and ease of perception // 9th Conference on Information Technologies in Control (ITC) . Proceedings. St.Petersburg, Russia. October 4–6, 2016. P.750-757. // https://elibrary.ru/item.asp?id=27559707 (in Russian).
  25. Andrey Chechulin. Tehniques for attack models building and modification for network security analysis // 9th Conference on Information Technologies in Control (ITC) . Proceedings. St.Petersburg, Russia. October 4–6, 2016. P.782-785.// https://elibrary.ru/item.asp?id=27559713&pff=1 (in Russian).
  26. Maxim Kolomeec, Igor Kotenko, Andrey Chechulin. Visualization model for cybersecurity monitoring system based on analogue of Voronoi diagrams // 15th National Conference on Artificial Intelligence with International Participation (CAI 2016). October, 3-7, 2016. Smolensk, Russia. Proceedings of the conference. P.180-187. // https://elibrary.ru/item.asp?id=27307887 (in Russian).
  27. Dmitry Levshun, Andrey Chechulin, Igor Kotenko. Secure inter-controller interaction based on I2C protocol // XV Ąnniversary Saint-Petersburg International Conference "Regional informatics-2016 (RI-2016)". Proceedings. St. Petersburg, 2016. P.169-170. http://www.spoisu.ru/files/ri/ri2016/ri2016_materials.pdf // https://elibrary.ru/item.asp?id=29348476 (in Russian).
  28. Dmitry Novozhilov, Andrey Chechulin. Metrics for the analysis of the structural features of the web pages by machine learning methods // XV Ąnniversary Saint-Petersburg International Conference "Regional informatics-2016 (RI-2016)". Proceedings. St. Petersburg, 2016. P.184-185. http://www.spoisu.ru/files/ri/ri2016/ri2016_materials.pdf (in Russian).
  29. Mikhail Mikhailov, Andrey Chechulin. Clusterization-correlation scanner the data warehouse // XV Ąnniversary Saint-Petersburg International Conference "Regional informatics-2016 (RI-2016)". Proceedings. St. Petersburg, 2016. P.181. http://www.spoisu.ru/files/ri/ri2016/ri2016_materials.pdf // https://elibrary.ru/item.asp?id=35091366 (in Russian).
  30. Mikhail Bulgakov, Andrey Chechulin. Development of hardware and software for the simulation of the security incidents in railway systems. XV Ąnniversary Saint-Petersburg International Conference "Regional informatics-2016(RI-2016)". Proceedings. St. Petersburg, 2016. P.151. http://www.spoisu.ru/files/ri/ri2016/ri2016_materials.pdf // https://elibrary.ru/item.asp?id=35091362&pff=1 (in Russian).
  31. Maxim Kolomeec, Andrey Chechulin, Yan Kopchak. Development of a graphical interface for visualization of computer network security systems. XV Ąnniversary Saint-Petersburg International Conference "Regional informatics-2016 (RI-2016)" Proceedings. St. Petersburg, 2016. P.166-167. http://www.spoisu.ru/files/ri/ri2016/ri2016_materials.pdf // https://elibrary.ru/item.asp?id=29349010 (in Russian).
  32. Dmitry Levshun, Andrey Chechulin. Comparison of approaches for the construction of a database for the organization of research materials in a unified repository for multimedia data from field ethnographic expeditions // Regional informatics "RI-2016". Conference materials. 2016. pp. 330-331. http://www.spoisu.ru/files/ri/ri2016/ri2016_materials.pdf // https://elibrary.ru/item.asp?id=29348408 (in Russian).
  33. Nikita Dubrovin, Igor Ushakov, Andrey Chechulin. Big data technologies for security information and event management systems // 5th International Conference on Advanced Infotelecommunication ("ICAIT-2016"). March, 10-11, 2016. Collection of scientific papers. Saint-Petersburg, 2016. Vol.1, P.348-353. // https://elibrary.ru/item.asp?id=27296327 (in Russian).
  34. Vasily Desnitsky, Andrey Chechulin. Information flow verification technique for Internet of things systems // XV Ąnniversary Saint-Petersburg International Conference "Regional informatics-2016 (RI-2016)". Proceedings. St. Petersburg, 2016. P.156-157. http://www.spoisu.ru/files/ri/ri2016/ri2016_materials.pdf // https://elibrary.ru/item.asp?id=32608615&pff=1 (in Russian).

2015

  1. Andrey Fedorchenko, Igor Kotenko and Andrey Chechulin. Design of integrated vulnerabilities database for computer networks security analysis. 23th Euromicro International Conference on Parallel, Distributed, and Network-Based Processing (PDP 2015). Turku, Finland, March, 2015. P.559-566. DOI: 10.1109/PDP.2015.38 // https://elibrary.ru/item.asp?id=26999070
  2. Igor Kotenko, Andrey Fedorchenko and Andrey Chechulin. Integrated repository of security information for network security evaluation // Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications. 2015. Ņ. 6. ¹ 2. Ń. 41-57. href="http://jowua.yolasite.com/vol6no2.php">http://jowua.yolasite.com/vol6no2.php (Scopus) eLIBRARY ID: 23989252 (in Russian).
  3. Maxim Kolomeec, Andrey Chechulin and Igor Kotenko. Methodological Primitives for Phased Construction of Data Visualization Models. Journal of Internet Services and Information Security (JISIS), Vol.5, No.4, November, 2015. P.60-84. http://www.jisis.org/vol5no4.php // https://elibrary.ru/item.asp?id=28865195
  4. Andrey Chechulin, Igor Kotenko. Attack Tree-based Approach for Real-Time Security Event Processing //Automatic Control and Computer Sciences. 2015. Vol. 49. ¹ 8. P. 701-704. DOI: 10.3103/S0146411615080052 // https://elibrary.ru/item.asp?id=27137320
  5. A. Fedorchenko, I. Kotenko, A. Chechulin. Integrated repository of security information for network security evaluation // Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications. 2015. Ņ. 6. ¹ 2. Ń. 41-57. // https://elibrary.ru/item.asp?id=23989252
  6. Igor Kotenko, Andrey Chechulin, Dmitry Komashinsky. Evaluation of Text Classification Techniques for Inappropriate Web Content Blocking // The IEEE 8th International Conference on “Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications” (IDAACS'2015). Proceedings. Warsaw, Poland, September 24-26, 2015. P.412-417. DOI: 10.1109/IDAACS.2015.7340769 // https://www.elibrary.ru/item.asp?id=26955270 (Scopus)
  7. Igor Kotenko, Igor Saenko, Andrey Chechulin. Development of new generation of security information and event management systems // Methods and technical means of ensuring information security. 2015. No. 24. pp. 123-124. // https://www.elibrary.ru/item.asp?id=36546656 (in Russian).
  8. Igor Kotenko, Andrey Chechulin, Dmitry Komashinsky. Automated categorization of web-sites for inappropriate content blocking. Problems of information security. Computer systems. ¹ 2, 2015. P.62-68. // https://www.elibrary.ru/item.asp?id=24115356 (in Russian).
  9. Maxim Kolomeec, Andrey Chechulin, Igor Kotenko. Review of Methodological Primitives for the Phased Construction of Data Visualization Model .SPIIRAS Proceedings. 2015. ¹ 5 (42), P.232-257 // https://elibrary.ru/item.asp?id=24277967 (in Russian).
  10. Dmitry Levshun, Andrey Chechulin. Problems of construction a single repository of multimedia data from field ethnographic expeditions. Technical sciences – from theory to practice. 2015, ¹46, Novosibirsk, SibAK, P.25-30. (in Russian).
  11. Igor Kotenko, Evgenia Novikova, Andrey Chechulin. Visualization of security metrics for security monitoring and event management. Problems of information security. Computer systems. ¹ 4, 2015. P.42-47. // https://elibrary.ru/item.asp?id=25817956 (in Russian).
  12. Valery Kuvaev, Andrey Chechulin, Viacheslav Efimov, Konstantin Lizhinkin. Options for the design a unified information space for the integration of heterogeneous automated systems. Information and Space. Scientific and technical journal, ¹ 4, 2015, P.83-87. // https://elibrary.ru/item.asp?id=25371843 (in Russian).
  13. Elena Doynikova, Igor Kotenko, Andrey Chechulin. Dynamic security assessment of computer networks in siem-systems // Information Technology Security, Vol. 22 ¹ 3, 2015. P.33-42. // https://elibrary.ru/item.asp?id=25284632 (in Russian).
  14. Andrey Fedorchenko, Igor Kotenko, Andrey Chechulin. Development of Information Access and Management Services for Integrated Vulnerability Database // Security of Information Technologies 2015. Vol. 22. No. 4. pp. 21-27. // https://elibrary.ru/item.asp?id=27704651 (in Russian).
  15. Maxim Kolomeec, Andrey Chechulin, Igor Kotenko. Visualization of security settings of computer networks using a Voronov's diagram. IX Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2015)", Saint-Petersburg, October 28-30, 2015. The proceedings of conference, 2015. P.73-74. // https://elibrary.ru/item.asp?id=29348616 (in Russian).
  16. Anton Pronoza, Andrey Chechulin. Model of information gathering process for a heterogeneous network structure investigation for visualization component of security information and event management systems // Methods and technical means of ensuring information security. 2015. No. 24. pp. 125-127. // https://elibrary.ru/item.asp?id=36546658 (in Russian).
  17. Andrey Chechulin, Anton Pronoza. Classification and analysis of network objects' relations types for further visualization // Methods and technical means of ensuring information security. 2015. No. 24. pp. 132-133.// https://elibrary.ru/item.asp?id=36546661 (in Russian).
  18. Andrey Chechulin. Classification and models development for network objects relation representation. International congress IS&IT15 - International Conference on Artificial Intelligence and Systems. Proceedings. Divnomorskoye, Russia. September 2-9, 2015. Mosńow, Fizmathlit, 2015. Vol. 2. P.165-170. (in Russian).
  19. Dmitry Smirnov, Andrey Chechulin. Security data correlation in IoT networks. 17th International Conference “RusCrypto” on Cryptology, Steganography, Digital Signature and Security Systems. Solnechnogorsk, Russia. March 22-25, 2015. http://www.ruscrypto.ru/ (in Russian).
  20. Dmitry Levshun, Andrey Chechulin, Maxim Kolomeec, Igor Kotenko. An architecture of access management system to a room on the base of contactless smart cards. IX Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2015)", Saint-Petersburg, October 28-30, 2015. The proceedings of conference, 2015. P.76. // https://elibrary.ru/item.asp?id=29348371 (in Russian).
  21. Dmitry Novozhilov, Andrey Chechulin. Development of software tools to support the experiments on a web site classification. IX Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2015)", Saint-Petersburg, October 28-30, 2015. The proceedings of conference, 2015. P.80-81. // https://elibrary.ru/item.asp?id=35088474&pff=1 (in Russian).
  22. Anton Pronoza, Andrey Chechulin, Sergey Bushuev. Model of presentation of data of heterogeneous structure on information objects of computer network for visualization subsystem of event management systems and security information // IX Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2015)", Saint-Petersburg, October 28-30, 2015. The proceedings of conference, 2015. P.82-83. // https://elibrary.ru/item.asp?id=35088482&pff=1 (in Russian).
  23. Sergey Bushuev, Andrey Chechulin, Anton Pronoza. Classification of sources of network objects and relationships between them. IX Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2015)", Saint-Petersburg, October 28-30, 2015. The proceedings of conference, 2015. P.62-63. // https://elibrary.ru/item.asp?id=35089135 (in Russian).
  24. Andrey Chechulin. Mathematical models and algorithms for modeling attacks and the development of countermeasures in near-real time. IX Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2015)", Saint-Petersburg, October 28-30, 2015. The proceedings of conference, 2015. P.90.// https://elibrary.ru/item.asp?id=35089146&pff=1 (in Russian).
  25. Chechulin A.A. Models and methods development for protection against unwanted and harmful information on the Internet // 20th St.Petersburg assembly of the young scientists and specialists. Proceedings.St.Petersburg, 2015. P.133. (in Russian).
  26. Alexander Mozhaev, Alexander Nozik, Alexander Strukov, Andrey Chechulin. Modern trends in structural and logical analysis of reliability and cybersecurity of Automated Process Control Systems (APCS). International Science School "Modeling and Analysis of Safety and Risk in Complex Systems" (MABR-2015). St.Petersburg, Russia, November 17-19, 2015. P. 140-145 // https://elibrary.ru/item.asp?id=25391175&pff=1 (in Russian).

2014

  1. Igor Kotenko, Andrey Shorov, Andrey Chechulin, Evgenia Novikova. Dynamical Attack Simulation for Security Information and Event Management // Lecture Notes in Geoinformation and Cartography. 2014. ¹ 199699. Ń. 219-234. DOI: 10.1007/978-3-642-31833-7_14 // https://elibrary.ru/item.asp?id=30986943
  2. Igor Kotenko, Andrey Chechulin. Fast Network Attack Modeling and Security Evaluation based on Attack Graphs // Journal of Cyber Security and Mobility, Vol.3, No.1, 2014. P.27–46. DOI: 10.13052/jcsm2245-1439.312 // https://elibrary.ru/item.asp?id=28953942
  3. Igor Kotenko, Andrey Chechulin, Andrey Shorov, Dmitry Komashinsky. Analysis and Evaluation of Web Pages Classification Techniques for Inappropriate Content Blocking // Lecture Notes in Computer Science. 2014. Ņ. 8557 LNAI. Ń. 39-54. DOI: 10.1007/978-3-319-08976-8_4 // https://www.elibrary.ru/item.asp?id=41762947
  4. Igor Kotenko, Elena Doynikova and Andrey Chechulin. Security metrics based on attack graphs for the Olympic Games scenario // Proceedings - 2014 22nd Euromicro International Conference on Parallel, Distributed, and Network-Based Processing, PDP 2014. 2014. Ń. 561-568. DOI: 10.1109/PDP.2014.113 // https://elibrary.ru/item.asp?id=21873723
  5. Igor Kotenko, Igor Saenko, Andrey Chechulin. Proactive management of security information and events in the information and telecommunication systems // Radio electronics issues. 2014. Vol. 3. No. 1. pp. 170-180. // https://elibrary.ru/item.asp?id=21314643 (in Russian).
  6. Andrey Chechulin, Igor Kotenko, Vasily Desnitsky. Features of the information security systems design in cyber-physical systems // Methods and technical means of ensuring information security. 2014. No. 23. pp. 67-69. https://www.elibrary.ru/item.asp?id=36467256 (in Russian).
  7. Vasily Desnitsky, Andrey Chechulin. Verification of information and telecommunication systemms with embedded devices on the base of generalized intuder model // Methods and technical means of ensuring information security. 2014. No. 23. pp. 66-67. https://www.elibrary.ru/item.asp?id=36467255 (in Russian).
  8. Andrey Fedorchenko, Andrey Chechulin, Igor Kotenko. Open vulnerability bases and their application in security analysis systems of computer networks // Management-information systems, 2014, ¹5(72), P.72-79. // https://elibrary.ru/item.asp?id=22479528 (in Russian).
  9. Andrey Chechulin, Igor Kotenko. Attack Graph Construction for Security Events Analysis // Security of Information Technologie. 2014. Vol. 21. No. 3. pp. 135-141. // https://elibrary.ru/item.asp?id=23396058 (in Russian).
  10. Andrey Chechulin, Igor Kotenko. Real-time security events processing using an approach based on the attack trees analysis. Problems of information security. Computer systems. 2014. ¹ 3, P.56-59.// https://elibrary.ru/item.asp?id=22508074 (in Russian).
  11. Andrey Fedorchenko, Andrey Chechulin, Igor Kotenko. Analytical overview of open vulnerabilities databases. Problems of information security. Computer systems. ¹ 3, 2014. P.131-135. // https://elibrary.ru/item.asp?id=22508083 (in Russian).
  12. Vasily Desnitsky, Andrey Chechulin. Generalized intruder model and verification of information systems with embedded devices // Technical sciences - from theory to practice. 2014. No. 39. pp. 7-21. // https://elibrary.ru/item.asp?id=22562560 (in Russian).
  13. Anton Noskov, Andrey Chechulin. Investigation of heuristic approach to attacks on the telecommunications network detection based on data mining techniques // Proceedings of SPIIRAS. Issue 6 (37). Pp. 208-224. Saint Petersburg: Nauka, 2014 // https://elibrary.ru/item.asp?id=22777714 (in Russian).
  14. A.V. Fedorchenko, A.A. Chechulin, I.V. Kotenko. Building an integrated vulnerability database // News of higher educational institutions. Instrumentation. 2014. Vol. 57. No. 11. pp. 62-67. // https://elibrary.ru/item.asp?id=22502740 (in Russian).
  15. Dmitry Levshun, Andrey Chechulin. Construction of the classification scheme for the existing methods of security events correlation. XIV Saint-Petersburg International Conference “Regional informatics-2014” (“RI-2014”). Proceedings. St. Petersburg, 2014. Š.148-149. // https://elibrary.ru/item.asp?id=29293506 (in Russian).
  16. Alexandra Kasatkina, Andrey Chechulin. Multimedia database on IFUGAO folklore (Philippines): specifying a problem and selecting solutions // All-Russian Research-to-Practice Conference "Native minorities in dominating society: Practice of applied studies and efficient tools of ethnic". Kemerovo, 17-18 October 2014. Proceedings. Kemerovo, 2014. Š.312-317. // https://www.elibrary.ru/item.asp?id=32295680 (in Russian).
  17. Andrey Chechulin, Igor Kotenko. Application of Big Data processing methods for computer network infrastructure security // Materials of the conference "Information Technologies in Management" (ITU-2014). 2014. pp. 614-617. // https://elibrary.ru/item.asp?id=22461598 (in Russian).
  18. Andrey Fedorchenko, Andrey Chechulin, Igor Kotenko. Integrated vulnerabilities database for computer networks security evalution systems // Materials of the conference "Information Technologies in Management" (ITU-2014). 2014. pp. 638-341.// https://elibrary.ru/item.asp?id=22461602 (in Russian).
  19. Andrey Chechulin, Igor Kotenko. Design of the system for users protection against inappropriate content in the Internet. In the collection: Materials of the conference "Information Technologies in Management" (ITU-2014). 2014. pp. 642-647. // https://elibrary.ru/item.asp?id=22461603 (in Russian).
  20. Andrey Chechulin. The main challenges in the design of an electronic catalog of field data. Maklaevskie chtenya-2014. St. Petersburg, Russia. April 15-16, 2014. http://www.kunstkamera.ru/science/konferencii_i_seminary/2014/maklaevskie_chteniya2014/ (in Russian).
  21. Dmitry Novozhilov, Andrey Chechulin. Web-page text language recognition techniques. XIV Saint-Petersburg International Conference “Regional informatics-2014” (“RI-2014”). Proceedings. St. Petersburg, 2014. Š.155-156. (in Russian).
  22. Andrey Chechulin, Dmitry Komashinkiy. Approach for classification of websites in foreign languages in the Internet. XIV Saint-Petersburg International Conference “Regional informatics-2014” (“RI-2014”). Proceedings. St. Petersburg, 2014. Š.169-170. (in Russian).
  23. Andrey Chechulin, Igor Kotenko. Software prototype of analytical attacks modeling component for security information and events management systems. XIV Saint-Petersburg International Conference “Regional informatics-2014” (“RI-2014”). Proceedings. St. Petersburg, 2014. Š.170-171. (in Russian).
  24. Andrey Fedorchenko, Andrey Chechulin, Igor Kotenko. The integrated database of vulnerabilities. International Scientific and Practical Conference "Theoretical and applied problems of information security." June 19, 2014, Minsk, Academy of MIA Republic of Belarus, 2014. (in Russian).
  25. Andrey Chechulin. The analysis and classification of a possible changes occurring in a computer network and their influence on trees of attacks. International Scientific and Practical Conference "Theoretical and applied problems of information security." June 19, 2014, Minsk, Academy of MIA Republic of Belarus, 2014. (in Russian).
  26. Igor Kotenko, Igor Saenko, Andrey Chechulin. Proactive management of information and security events in network NGN. Seminar of the International Telecommunication Union "Transition developing countries with existing networks to next generation network (NGN): technical, economic, legal and political aspects", St. Petersburg, St. Petersburg GUT Bonch-Bruyevich. 23-25 June 2014. (in Russian).

2013

  1. Igor Kotenko, Igor Saenko, Olga Polubelova, Andrey Chechulin. Design and Implementation of a Hybrid Ontological-Relational Data Repository for SIEM systems // Future internet, Vol. 5, ¹3, 2013. P.355-375. ISSN 1999-5903. // https://elibrary.ru/item.asp?id=28953990
  2. Igor Kotenko, Andrey Chechulin. A Cyber Attack Modeling and Impact Assessment Framework. 5th International Conference on Cyber Conflict 2013 (CyCon 2013). Proceedings. IEEE and NATO COE Publications. 4-7 June 2013, Tallinn, Estonia. 2013. P.119-142. (WoS, Scopus)
  3. Igor Kotenko, Andrey Chechulin. Computer Attack Modeling and Security Evaluation based on Attack Graphs. The IEEE 7th International Conference on “Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications” (IDAACS'2013). Proceedings. Berlin, Germany, September 12-14, 2013. P.614-619. DOI: 10.1109/IDAACS.2013.6662998 // https://elibrary.ru/item.asp?id=21908395
  4. I. Kotenko, A. Chechulin. A cyber attack modeling and impact assessment framework // Ā ńįīšķčźå: Pan American Health Care Exchanges, PAHCE. Ńåš. "2013 5th International Conference on Cyber Conflict, CyCon 2013 - Proceedings" 2013. P. 6568374 // https://elibrary.ru/item.asp?id=23977532
  5. Igor Kotenko, Olga Polubelova, Andrey Chechulin. Design of the ontology based data model for the network attack modeling system. Proceedings of SPIIRAS. Issue 3 (26). St.Petersburg, Nauka, 2013. P.26-39. // https://elibrary.ru/item.asp?id=19416903 (in Russian).
  6. Andrey Chechulin. Technique of rapid construction, modification and analysis of attack trees. Proceedings of SPIIRAS. Issue 3 (26). St.Petersburg, Nauka, 2013. P.40-53. // https://elibrary.ru/item.asp?id=19416904 (in Russian).
  7. Igor Kotenko, Elena Doynikova, Andrey Chechulin. Dynamical recalculation of the security metrics on the example of attack potentiality // Proceedings of SPIIRAN. 2013. No. 7 (30). pp. 26-39. // https://elibrary.ru/item.asp?id=20927236 (in Russian).
  8. Igor Kotenko, Andrey Chechulin. Toward network access control with software-defined networking // High availability systems. 2013. Vol. 9. No. 3. pp. 103-110. // https://elibrary.ru/item.asp?id=21046159 (in Russian).
  9. Vasily Desnitsky, Igor Kotenko, Andrey Chechulin. Verification of information flows for design of secure information systems with embedded devices // High availability systems, 2013. Vol. 9. No. 3. pp. 112-117. // https://elibrary.ru/item.asp?id=21046160 (in Russian).
  10. Dmitry Komashinskiy, Igor Kotenko, Andrey Chechulin, Andrey Shorov. Autoimatic system for categorization of websites for blocking web pages with inappropriate content // High availability systems. 2013. Vol. 9. No. 3. pp. 119-127. // https://www.elibrary.ru/item.asp?id=21046161 (in Russian).
  11. Andrey Chechulin. Technique of attack graphs building for systems of security event analysis. Innovations in Science, ¹16-1, 2013. Novosibirsk, SibAK, 2013. Š.156-160.// https://elibrary.ru/item.asp?id=18766389 (in Russian).
  12. Andrey Chechulin, Igor Kotenko. Construction of attack graphs for security events correlation. 15th Conference “RusCrypto” on Cryptology, Steganography, Digital Signature and Security Systems. Solnechnogorsk, Russia. March 28-30, 2013. http://www.ruscrypto.ru/ (in Russian).
  13. Vasily Desnitsky, Igor Kotenko, Andrey Chechulin. Design of secure information systems with embedded devices. 15th Conference “RusCrypto”. Solnechnogorsk, Russia. March 28-30, 2013. http://www.ruscrypto.ru/ (in Russian).
  14. Dmitry Komashinskiy, Andrey Chechulin, Igor Kotenko, Andrey Shorov. Categorization of web sites for inadmissible web pages blocking systems. 15th Conference “RusCrypto” on Cryptology, Steganography, Digital Signature and Security Systems. Solnechnogorsk, Russia. March 28-30, 2013. http://www.ruscrypto.ru/ (in Russian).
  15. Andrey Shorov, Andrey Chechulin, Igor Kotenko. Categorization of web sites for inadmissible web pages blocking for decision support systems in cyber security. 22th All-Russian Conference “Methods and technical tools of information security”(MTTIS 2013)”. Proceedings. St.Petersburg, Russia. July 08-11, 2013. P.75-77. (in Russian).
  16. Andrey Chechulin. Recognition of malefactors by attack tress analysis. 22th All-Russian Conference “Methods and technical tools of information security”(MTTIS 2013)”. Proceedings. St.Petersburg, Russia. July 08-11, 2013. P.141-142. (in Russian).
  17. Andrey Shorov, Andrey Chechulin, Igor Kotenko. Categorization of web sites for inadmissible web pages blocking systems by textual and graphical content analysis. VIII Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2013)", Saint-Petersburg, October 23-25, 2013. The proceedings of conference, 2013. P.129-130. (in Russian).
  18. Andrey Chechulin. Application of analytical attack modeling for security level increasing of distributed information systems. VIII Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2013)", Saint-Petersburg, October 23-25, 2013. The proceedings of conference, 2013. P.127-128. (in Russian).

2012

  1. Igor Kotenko, Andrey Chechulin, Evgenia Novikova. Attack Modelling and Security Evaluation for Security Information and Event Management. SECRYPT 2012. International Conference on Security and Cryptography. Proceedings. Rome, Italy. 24–27 July 2012. P.391-394. // https://elibrary.ru/item.asp?id=20496746
  2. Igor Kotenko, Andrey Chechulin. Attack Modeling and Security Evaluation in SIEM Systems // International Transactions on Systems Science and Applications. 2012. Ņ. 8. Ń. 129-147. // https://elibrary.ru/item.asp?id=28867303
  3. Vasily Desnitsky, Igor Kotenko, Andrey Chechulin. Configuration-based approach to embedded device security. Lecture Notes in Computer Science, Springer-Verlag // Lecture Notes in Computer Science. 2012. Ņ. 7531 LNCS. Ń. 270-285. DOI: 10.1007/978-3-642-33704-8_23 // https://elibrary.ru/item.asp?id=20474247
  4. Andrey Chechulin, Igor Kotenko, Vasily Desnitsky. An Approach for Network Information Flow Analysis for Systems of Embedded Components // Lecture Notes in Computer Science. 2012. Ņ. 7531 LNCS. Ń. 146-155. DOI: 10.1007/978-3-642-33704-8_13 // https://elibrary.ru/item.asp?id=20474240
  5. Igor Kotenko, Andrey Chechulin and Elena Doynikova. Analytical Attack Modeling in Security Information and Event Management Systems. Proceedings of the Work in Progress Session held in connection with the 20th Euromicro International Conference on Parallel, Distributed and network-based Processing (PDP 2012). Garching/Munich, February 2012. SEA-Publications. SEA-SR-31. 2012. P.27-28. // https://elibrary.ru/item.asp?id=28166372
  6. Igor Kotenko, Andrey Chechulin. Common Framework for Attack Modeling and Security Evaluation in SIEM Systems // Proceedings - 2012 IEEE Int. Conf. on Green Computing and Communications, GreenCom 2012, Conf. on Internet of Things, iThings 2012 and Conf. on Cyber, Physical and Social Computing, CPSCom 2012. 2012. Ń. 94-101. DOI: 10.1109/GreenCom.2012.24 // https://elibrary.ru/item.asp?id=20475202
  7. Igor Kotenko, Igor Saenko, Olga Polubelova, Andrey Chechulin. Technologies of security information and event management for computer network protection // Computer systems. ¹ 3, 2012. P.57-68. // https://elibrary.ru/item.asp?id=17867303 (in Russian).
  8. Vasily Desnitsky, Igor Kotenko, Andrey Chechulin. Configuring of combined protection components for embedded devices by solving optimality task // Highly Available Systems. 2012. Ņ. 8. ¹ 2. Ń. 50-56. eLIBRARY ID: 17997821 (in Russian).
  9. Vasily Desnitsky, Igor Kotenko, Andrey Chechulin. Configuration of secure systems with embedded and mobile devices // Information security issues. 2012. No. 2 (97). pp. 20-28. // https://elibrary.ru/item.asp?id=17795186 (in Russian).
  10. Andrey Chechulin, Igor Kotenko, Vasily Desnitsky. Information flow analysis techniques for development of secure systems which includes embedded systems // High availability systems. 2012. Vol. 8. No. 2. pp. 116-122 // https://elibrary.ru/item.asp?id=17997830 (in Russian).
  11. Olga Polubelova, Igor Kotenko, Igor Saenko, Andrey Chechulin. Applying ontologies and logical inference for security information and event menegement // High availability systems, Vol.8, ¹ 2, 2012. P.100-108. // https://elibrary.ru/item.asp?id=17997828 (in Russian).
  12. Igor Kotenko, Igor Saenko, Olga Polubelova, Andrey Chechulin. Application of the methods of security event and information management for information protection in the critical infrastructures. Proceedings of SPIIRAS. Issue 1 (20). St.Petersburg, Nauka, 2012. P.27-56. // https://elibrary.ru/item.asp?id=17918594 (in Russian).
  13. Igor Kotenko, Elena Doynikova, Andrey Chechulin. Total enumeration and classification of attack patterns (CAPEC): description and application examples. Information Security. Inside, ¹ 4(46), 2012. P.54-66 // https://elibrary.ru/item.asp?id=23063462 (in Russian).
  14. Colin Fidge, Andrey Chechulin. Information flow analysis for development of secure systems with embedded devices. 14th Conference “RusCrypto” on Cryptology, Steganography, Digital Signature and Security Systems. Solnechnogorsk, Russia. March 28-30, 2012. http://www.ruscrypto.ru/ (in Russian).
  15. Igor Kotenko, Andrey Chechulin. Analytical attack modeling in security event and information management systems. 21th All-Russian Conference "Methods and technical tools of information security" (MTTIS 2012). Proceedings. St.Petersburg, Russia. June 24-29, 2012. P.57-58. (in Russian).
  16. Andrey Chechulin, Vasily Desnitsky, Igor Kotenko. Information flow analysis for development of secure systems with embedded devices. 21th All-Russian Conference "Methods and technical tools of information security" (MTTIS 2012). Proceedings. St.Petersburg, Russia. June 24-29, 2012. P.35-37. (in Russian).
  17. Vasily Desnitsky, Andrey Chechulin. Analysis of incompatibilities between security components in design process of secure embedded devices. 21th All-Russian Conference "Methods and technical tools of information security" (MTTIS 2012). Proceedings. St.Petersburg, Russia. June 24-29, 2012. P.17-19. (in Russian).
  18. Andrey Chechulin. Technique for evaluation of the efficiency of combined protection against network scanning. 21th All-Russian Conference "Methods and technical tools of information security" (MTTIS 2012). Proceedings. St.Petersburg, Russia. June 24-29, 2012. P.79-81. (in Russian).
  19. Igor Kotenko, Andrey Chechulin. Analytical attack modeling for security event and information management. International congress IS&IT - International Conference on Artificial Intelligence and Systems. Proceedings. Divnomorskoye, Black Sea Coast, Russia. September 2-9. Moskow, Fizmathlit, 2012. Vol.1. P.385-391. // https://www.elibrary.ru/item.asp?id=29293575 (in Russian).
  20. Evgenia Novikova, Chechulin A.A., Igor Kotenko. Visualisation techniques for computer attack counteraction in security information and event management systems. St. Petersburg Scientific Forum "Science and Society". "Science and Mankind Progress". VII St.Petersburg Nobel Prize Laureates Meeting. Proceedings. St.Petersburg, Russia. P.151-152. (in Russian).
  21. Vasily Desnitsky, Igor Kotenko, Andrey Chechulin. Design of secure embedded systems in European Union project SecFutur. 5th Russian Multiconference on Problems in Control (MPC). Conference on Information Technologies in Control (ITC).Proceedings. St.Petersburg, Russia. October 9–11, 2012. P.699-708. // https://www.elibrary.ru/item.asp?id=21718338 (in Russian).
  22. Andrey Chechulin, Igor Kotenko, Evgenia Novikova, Elena Doynikova. Attacks and protection mechanisms in the security event and information management. 5th Russian Multiconference on Problems in Control (MPC). Conference on Information Technologies in Control (ITC).Proceedings. St.Petersburg, Russia. October 9–11, 2012. P.735-739. // https://elibrary.ru/item.asp?id=21721925 (in Russian).
  23. Vasily Desnitsky, Andrey Chechulin. Analysis of incompatibilities of security components in embedded devices. XIII Saint-Petersburg International Conference “Regional informatics-2012” (“RI-2012”). Proceedings. St. Petersburg, 2012. P.93. (in Russian).
  24. Vasily Desnitsky, Andrey Chechulin, Igor Kotenko. Using anytime algorithms of attack modeling and security evaluation in SIEM systems. XIII Saint-Petersburg International Conference “Regional informatics-2012” (“RI-2012”). Proceedings. St. Petersburg, 2012. P. 92. (in Russian).
  25. Andrey Chechulin, Igor Kotenko. Attack graph building based on malefactor models and information on vulnerabilities and attack patterns. XIII Saint-Petersburg International Conference “Regional informatics-2012” (“RI-2012”). Proceedings. St. Petersburg, 2012. P.129-130. // https://www.elibrary.ru/item.asp?id=35097362 (in Russian).
  26. Andrey Chechulin. Malefactor goals recognition based on analysis of security events and attack graphs. XIII Saint-Petersburg International Conference “Regional informatics-2012” (“RI-2012”). Proceedings. St. Petersburg, 2012. P.129-130. (in Russian).
  27. Andrey Chechulin, Vasily Desnitsky. Information flow analysis in the task of embedded system analysis. XIII Saint-Petersburg International Conference “Regional informatics-2012” (“RI-2012”). Proceedings. St. Petersburg, 2012. P.129. (in Russian).
  28. Andrey Chechulin. Development of an advanced intrusion detection system. XVII St. Petersburg assembly of young scientists and specialists. Proceedings. October 12, 2012. P.196. (in Russian).
  29. Jose Fran. Ruiz, Vasily Desnitsky, Rajesh Harjani, Antonio Manna, Igor Kotenko and Andrey Chechulin. A Methodology for the Analysis and Modeling of Security Threats and Attacks for Systems of Embedded Components // Ā ńįīšķčźå: Proceedings - 20th Euromicro International Conference on Parallel, Distributed and Network-Based Processing, PDP 2012. 20th Euromicro International Conference on Parallel, Distributed and Network-Based Processing, PDP 2012. Garching, 2012. Ń. 261-268. DOI: 10.1109/PDP.2012.36 // https://www.elibrary.ru/item.asp?id=17990791

2011

  1. Vasily Desnitsky, Igor Kotenko, Andrey Chechulin. An abstract model for embedded systems and intruders // Proceedings of the Work in Progress Session held in connection with the 19th Euromicro International Conference on Parallel, Distributed and network-based Processing (PDP 2011). Ayia Napa, Cyprus, February 2011. SEA-Publications. SEA-SR-29. 2011. P.25-26. ISBN 978-3-902457-29-5. // https://www.elibrary.ru/item.asp?id=28132924
  2. Igor Kotenko, Andrey Chechulin, Elena Doynikova. Combining of Scanning Protection Mechanisms in GIS and Corporate Information Systems // Lecture Notes in Geoinformation and Cartography. Ńåš. "Information Fusion and Geographic Information Systems: Towards the Digital Ocean, IF and GIS 2011" 2011. Ń. 45-58. DOI: 10.1007/978-3-642-19766-6_5 // https://elibrary.ru/item.asp?id=20528069
  3. Igor Kotenko, Philipp Nesteruk, Andrey Chechulin. Combining of scanning detection mechanisms in computer networks // Information security issues. 2011. No. 3 (94). pp. 30-34 // https://elibrary.ru/item.asp?id=17306706 (in Russian).
  4. Vasily Desnitsky, Andrey Chechulin. Models of development of secure embedded systems // High availability systems. 2011. Vol. 7. No. 2. pp. 97-101.// https://www.elibrary.ru/item.asp?id=17098471 (in Russian).
  5. Igor Kotenko, Vasily Desnitsky, Andrey Chechulin. Investigation of technologies for secure embedded systems design in European Union project SecFutur. Information Security. Inside, ¹ 3(39), 2011. P.68-75.// https://www.elibrary.ru/item.asp?id=23134338 (in Russian).
  6. Vasily Desnitsky, Igor Kotenko, Andrey Chechulin. Constructing and testing secure embedded systems. XII Saint-Petersburg International Conference “Regional informatics-2010” (“RI-2010”). Selected Proceedings. St. Petersburg, 2011. P.115-121. // https://www.elibrary.ru/item.asp?id=29293611 (in Russian).
  7. Andrey Chechulin, Igor Kotenko. Combining of scanning detection mechanisms. The Ninth All-Russian Scientific Conference "Mathematics and Security of Information Technologies" (MSIT-10). Moscow, 2011. (in Russian).
  8. Vasily Desnitsky, Igor Kotenko, Andrey Chechulin. Abstract model for embedded secure systems. The Nineth All-Russian Scientific Conference "Mathematics and Security of Information Technologies" (MSIT-10). Moscow, 2011. (in Russian).
  9. Andrey Chechulin, Vasily Desnitsky. Intruder model for provision of embedded systems security. The Nineth All-Russian Scientific Conference "Mathematics and Security of Information Technologies" (MSIT-10). Moscow, 2011. (in Russian).
  10. Dmitry Komashinkiy, Andrey Chechulin, Igor Kotenko. Categorization of web pages with inadmissible content. 13th Conference “RusCrypto” on Cryptology, Steganography, Digital Signature and Security Systems. Solnechnogorsk, Russia. March 30 - April 2, 2011. http://www.ruscrypto.ru/ (in Russian).
  11. Vasily Desnitsky, Andrey Chechulin. Unification of a process of secure embedded systems construction. 13th Conference “RusCrypto” on Cryptology, Steganography, Digital Signature and Security Systems. Solnechnogorsk, Russia. March 30 - April 2, 2011. http://www.ruscrypto.ru/ (in Russian).
  12. Andrey Chechulin. Application of combining techniques to the problem of protection against network scanning. 20th All-Russian Conference “Methods and technical tools of information security” (MTTIS 2011)”. Proceedings. St.Petersburg, Russia. June 27 - July 01, 2011. P.63-64. (in Russian).
  13. Ivan Morozov, Andrey Chechulin. Access to information in geographical information systems. 20th All-Russian Conference “Methods and technical tools of information security” (MTTIS 2011)”. Proceedings. St.Petersburg, Russia. June 27 - July 01, 2011. P.34-36. (in Russian).
  14. Andrey Chechulin, Igor Kotenko. Analysis of security events in a real network using a network attack modelling system. VII St.Petersburg Interregional Conference «Information Security of Russian Regions (IBRR-2011). October 26-28, 2011. Proceedings. St.Petersburg, 2011. P.97-98. // https://www.elibrary.ru/item.asp?id=35242777 (in Russian).
  15. Vasily Desnitsky, Igor Kotenko, Andrey Chechulin. Configuration model for combined protection of information systems with embedded devices. VII St.Petersburg Interregional Conference «Information Security of Russian Regions (IBRR-2011). October 26-28, 2011. Proceedings. St.Petersburg, 2011. P.69-70. (in Russian).
  16. Elena Doynikova, Andrey Chechulin, Igor Kotenko, Dmitry Kotenko. Extension of information risk assessment methodology to account for zero-day attacks // VII St.Petersburg Interregional Conference «Information Security of Russian Regions (IBRR-2011). October 26-28, 2011. Proceedings. St.Petersburg, 2011. P.71-72. // https://elibrary.ru/item.asp?id=35242695 (in Russian).
  17. Igor Kotenko, Igor Saenko, Olga Polubelova, Andrey Chechulin. Methods and tools of designing the repository for SIEM system in critical information infrastructure. The VII St.Petersburg Interregional Conference «Information Security of Russian Regions (ISRR-2011). October 26-28, 2011. Proceedings. St.Petersburg, 2011. P.79-80. // https://elibrary.ru/item.asp?id=35244528 (in Russian).
  18. Andrey Chechulin. Cooperation of scanning detection mechanisms. VII St.Petersburg Interregional Conference “Information Security of Russian Regions (IBRR-2011)”. October 26-28, 2011. Proceedings. St.Petersburg, 2011. P.96-97. (in Russian).
  19. D.V. Komashinsky, I.V. Kotenko, A.A. Chechulin. Categorization of websites for blocking web pages with inappropriate content // High availability systems. 2011. Vol. 7. No. 2. pp. 102-106. // https://www.elibrary.ru/item.asp?id=17098472 (in Russian).

2010

  1. Andrey Chechulin, Igor Kotenko. Combining scanning protection mechanisms in computer networks // Information and control systems. 2010. No. 6 (49). pp. 21-27. // https://www.elibrary.ru/item.asp?id=15581568 (in Russian).
  2. Andrey Chechulin. Protection against network attacks based on the combined mechanisms of traffic analysis. 12th International Conference “RusCrypto” on Cryptology, Steganography, Digital Signature and Security Systems. Zvenigorod, Russia. April 1-4, 2010. http://www.ruscrypto.ru/ (in Russian).
  3. Michail Stepashkin, Igor Kotenko, Andrey Chechulin, Alexsander Tulupyev, Tatyana Tulupyeva, Anton Pashenko. Approach to security analysis of automated systems taking into account social-engineering attacks. ÕIX All-Russian Conference “Methods and technical tools of information security” (MTTIS 2010)”. Proceedings. St.Petersburg, Russia. July 5-10, 2010. P.128-129. (in Russian).
  4. Igor Kotenko, Mikhail Stepashkin, Andrey Chechulin, Elena Doynikova, Dmitry Kotenko. Tools for security analysis of automated systems. ÕIX All-Russian Conference “Methods and technical tools of information security” (MTTIS 2010)”. Proceedings. St.Petersburg, Russia. July 5-10, 2010. P.115-116. (in Russian).
  5. Andrey Chechulin. Integration and optimal parameters selection of scanning protection mechanisms. ÕIX All-Russian Conference “Methods and technical tools of information security” (MTTIS 2010)”. Proceedings. St.Petersburg, Russia. July 5-10, 2010. P.25-26. (in Russian).
  6. Vasiliy Desnitsky, Andrey Chechulin, Igor Kotenko. Configuration model of embedded devices. XII Saint-Petersburg International Conference “Regional informatics-2010” (“RI-2010”). Proceedings. St. Petersburg, October 20-22, 2010. P.41-42. ISBN 978-5-904031-99-2. (in Russian).
  7. Vasiliy Desnitsky, Andrey Chechulin. Abstract model of embedded devices. XII Saint-Petersburg International Conference “Regional informatics-2010” (“RI-2010”). Proceedings. St. Petersburg, October 20-22, 2010. P.40-41. ISBN 978-5-904031-99-2. (in Russian).
  8. Andrey Chechulin. Integrating of malicious traffic detection mechanisms. XII Saint-Petersburg International Conference “Regional informatics-2010” (“RI-2010”). Proceedings. St. Petersburg, October 20-22, 2010. P.149. ISBN 978-5-904031-99-2. (in Russian).
  9. Andrey Chechulin, Vasily Desnitsky, Mikhail Stepashkin. Intruder model in the task of security assurance of embedded system. XII Saint-Petersburg International Conference “Regional informatics-2010” (“RI-2010”). Proceedings. St. Petersburg, October 20-22, 2010. P.150. ISBN 978-5-904031-99-2. (in Russian).

2009

  1. Kotenko I.V., Vorontsov V.V., Chechulin A.A., Ulanov A.V. Proactive mechanisms for defense against network worms: an approach, implementation and the results of experiments // Information Technologies. 2009. ¹ 1. Ń. 37-42. // https://elibrary.ru/item.asp?id=11736506
  2. I.V, Kotenko, V.V. Vorontsov, A.A. Chechulin, A.V. Ulanov. Proactive mechanisms for defense against network worms: an approach, implementation and the results of experiments // Information Technologies. 2009. ¹ 1. Ń. 37-42. // https://www.elibrary.ru/item.asp?id=11736506 (in Russian).
  3. Andrey Chechulin, Igor Kotenko. Protection against Network Attacks by Methods of Filtering and Normalization of Transport and Network Level Protocols. The 4th International Scientific Conference on Security Issues and Counter Terrorism. The Seventh All-Russian Scientific Conference "Mathematics and Security of Information Technologies" (MSIT-08). 2009. (in Russian).
  4. Andrey Chechulin, Igor Kotenko, Artem Tishkov, Yulia Zozulya, Andrey Shorov. Methods of protection against harmful Web-sites based on reputation evaluation. 11th Conference “RusCrypto” on Cryptology, Steganography, Digital Signature and Security Systems. Zvenigorod, Russia. April 2-5, 2009. http://www.ruscrypto.ru/. (in Russian).
  5. Andrey Chechulin. Detection and counteraction to network attacks on the basis of combined mechanisms of the traffic analysis. VI St.Petersburg Interregional Conference «Information Security of Russian Regions (ISRR-2009). October 28-30, 2009. Proceedings. St.Petersburg, 2009. P.143-144.// https://www.elibrary.ru/item.asp?id=35099955 (in Russian).
  6. Andrey Chechulin, Igor Kotenko. Detection and Counteraction of Network Attacks based on Combined Mechanisms of Traffic Analysis // Methods and technical means of ensuring information security. 2009. No. 18. p. 69. // https://www.elibrary.ru/item.asp?id=49913421 (in Russian).

2008

  1. Igor Kotenko, Victor Vorontsov, Artem Tishkov, Andrey Chechulin, Alexander Ulanov. Investigation of Proactive Protection Mechanisms against Network Worms. Third International Scientific Conference on Security Issues and Counter Terrorism "Problems of Security and Counter Terrorism". Materials. Moscow State University. 2008. P.278-283. (in Russian).
  2. Andrey Chechulin, Igor Kotenko. Investigation of Virus Throttling Defense Mechanisms against Network Worms // Information protection. Inside. 2008. No. 3 (21). pp. 68-73.// https://www.elibrary.ru/item.asp?id=23274038 (in Russian).
  3. Igor Kotenko, Victor Vorontsov, Andrey Chechulin. Detection and Containment of Spreading malware by means of combined protection mechanisms. ÕVII All-Russian Conference “Methods and technical tools of information security” (MTTIS 2008)”. Proceedings. St.Petersburg, Russia. June 27-29, 2008. (in Russian).
  4. Andrey Chechulin. Defense against Network Attacks by Normalization of Transport and Network Level Protocols of TCP/IP Stack. XI International Conference “Regional informatics-2008” (“RI-2008”). Proceedings. St. Petersburg, October 21-23, 2008. P.115-116. (in Russian).
  5. Igor Kotenko, Victor Vorontsov, Andrey Chechulin. Analysis of Network Worm Detection and Containment Mechanisms. V Interregional Conference “Information Security of Russian Regions (ISRR-2007)”. Selected Proceedings. St.Petersburg, 2008. P.113-119. (in Russian).

2007

  1. Igor Kotenko, Alexander Ulanov, Artem Tishkov, Vitaly Bogdanov, Victor Vorontsov, Andrey Chechulin. Simulation of Network Worm Detection and Containment in Computer Networks. The Third All-Russian Scientific-practical Conference on Simulation and its Application in Science and Industry “Simulation. Theory and Practice (IMMOD-2005)”. St.Petersburg, Russia. October 17-19, 2007. Proceedings. St.Petersburg, 2007. Vol.II. P.106-109. (in Russian).
  2. Andrey Chechulin, Igor Kotenko. Mechanisms of protection against network worms on the basis of threshold random walk method. V St.Petersburg Interregional Conference “Information Security of Russian Regions (ISRR-2007)”. St.Petersburg, Russia. October 23-25, 2007. Conference Proceedings. St.Petersburg, 2007. P.70.// https://www.elibrary.ru/item.asp?id=29391109 (in Russian).
  3. Andrey Chechulin. Investigation of Network Worm Detection and Containment Mechanisms based on Virus Throttling. V St.Petersburg Interregional Conference “Information Security of Russian Regions (ISRR-2007)”. St.Petersburg, Russia. October 23-25, 2007. Conference Proceedings. St.Petersburg, 2007. P.99-100. // https://www.elibrary.ru/item.asp?id=29391107 (in Russian).

2005

  1. Vladimir Platonov, Andrey Chechulin. Defending against network and transport layers attacks. IV Interregional Conference "Information Security of Russia Regions". Selected papers proceedings. St.Petersburg, 2005. P.114-115. (in Russian).

2003

  1. Alexander Rostovtsev, Elena Makhovenko, Alexander Filippov, Andrey Chechulin. About the durability of GOST 28147-89 // Problems of information security. Computer systems. 2003. No. 1. pp. 75-83 // https://www.elibrary.ru/item.asp?id=28143117 (in Russian).

Top 

RUSSIA, 199178, Saint-Petersburg, liniya 14-ya, 39, SPC RAS (metro station Vasileostrovskaya).
+7-(812)-328-7181, +7-(812)-328-2642, ivkote[AT]comsec[DOT]spb[DOT]ru

Comments? Questions? chechulin[AT]comsec[DOT]spb[DOT]ru

Locations of visitors to this page