| News | Staff | Projects | Awards | Patents | Results | Conferences | Collaboration | Publications | Events | Matherials | Links |
 | Contacts |
rus | eng |
  

Main publications

Books and Chapters in Books

  1. Igor Kotenko, Alexey Konovalov, Andrey Shorov. Discrete-Event Simulation of Botnet Protection Mechanisms. Discrete Event Simulations - Development and Applications. Edited by Eldin Wee Chuan Lim. Rijeka, Croatia: InTech. 2012 P.143-168.
  2. Igor Kotenko, Rafal Leszczyna. Software agents for network security. NATO Science for Peace and Security Series, Software Agents, Agent Systems and Their Applications, Volume 32, 2012. Edited by M.Essaaidi, M.Ganzha, and M.Paprzycki. Amsterdam, Netherlands: IOS Press. IOS Press. 2012. P. 260-285.
  3. Leszczyna R., Kotenko I. Security and anonymity of agent systems // NATO Science for Peace and Security Series, Software Agents, Agent Systems and Their Applications, Volume 32, 2012. Edited by M.Essaaidi, M.Ganzha, and M.Paprzycki. Amsterdam, Netherlands: IOS Press. IOS Press. 2012. P. 157-177.
  4. I.Kotenko. Agent-Based Modelling and Simulation of Network Cyber-Attacks and Cooperative Defence Mechanisms. Discrete Event Simulations. Sciyo, In-teh. 2010. P.223-246. ISBN 978-307-115-2.
  5. New information technologies in control systems for military use: A Textbook. I.B.Saenko, A.V.Avramenko, J.M.Kopchak, V.F. Schjotka and others / Edited by I.B.Saenko. SPb.: MCA, 2010. 518 p. (in Russian).
  6. Programming. Application development environment UI "Designer" of Operating System MSMF: Textbook. I.B. Saenko, V.V. Solomatin, S.M. Manyashin, Y.I. Zhukov, etc./ Edited by I.B. Saenko. SPb.: MSA, 2008. 128 pp.
  7. Nesteruk F.G, Suhanov A.V, Nesteruk L.G., Nesteruk G.F. Adaptive means of ensuring the security of information systems.Monograph. Ed. By L.G Osovetskiy. SPb.: Univ Polytechnic University, 2008. 626 p.
  8. Information Technology in Science and Education: Textbooks for higher education. P.1. Theoretical basis. I.B. Saenko, S.N. Bushuev, S.N. Nogin, A.J. Ivanov, etc./ Edited by I.B. Saenko. SPb.: MSA, 2007. 280 pp.
  9. Information Technology in Science and Education: Textbooks for higher education. P.1. Practical application.. I.B. Saenko, S.N. Bushuev, S.N. Nogin, A.J. Ivanov, etc./ Edited by I.B. Saenko. SPb.: MSA, 2007. 284 pp.
  10. Recent developments in control of the forces of the Navy. Monograph. S.M. Dotsenko, I.B. Saenko, I.V. Solovyev, V.V. Gekov, etc. SPb.: Politechnika. 2006. 432 pp.
  11. I.B. Saenko, M.V. Bochkov, S.N. Bushuev, V.S. Avramenko. Adaptive protection of information in computer networks for military purposes. Monograph / Edited by I.B. Saenko. SPb.: MSA, 2004. 210 pp.
  12. New information technologies in control systems for military use. Textbook. I.B. Saenko, S.N. Bushuev, , A.Y. Ivanov, A.I. Obrezkov, etc./ Edited by I.B. Saenko. SPb.: MSA, 2003. 160 pp.
  13. I.V.Kotenko, A.V.Bogovik, Kovalev I.S., etc. The control theory in military systems. I.V.Kotenko (ed.). Moscow, MD, 2001. 312 p. (in Russian).
  14. I.B. Saenko. The theoretical basis of the multidimensional / relational data and their application to build a database AMS of connection. Monograph / Edited by V.F. Komarovich. . SPb.: MSU, 2001. 176 pp.
  15. I.V.Kotenko, M.M.Kotuchov, A.S.Markov, etc. Legal, organizational and technical support of information security of the automation systems and telecommunication networks. I.V.Kotenko (ed.). SPb., MSU, 2000. 190 p. (in Russian).
  16. I.V.Kotenko, A.V.Bogovik, Kovalev I.S., etc. Foundations of the control theory in military systems. Part 2. A.Y. Runeev and I.V.Kotenko (ed.). SPb., MSU, 2000. 200 p. (in Russian).
  17. I.V.Kotenko, A.V.Bogovik, Kovalev I.S., etc. Foundations of the control theory in military systems. Part 1. A.Y. Runeev and I.V.Kotenko (ed.). SPb., MSU, 2000. 192 p. (in Russian).
  18. I.B. Saenko, A.Y. Ivanov, A.I. Obrezkov. Development of relational databases with the help of MicroSoft Access. Textbook. SPb.: MSA, 1999. 70pp.
  19. I.V.Kotenko. The theory and practice of construction of the systems of information and computing support of communication planning processes on the basis of new information technologies. SPb., MSA, 1998. 404 p. (in Russian).
  20. I.B. Saenko, A.Y. Ivanov. Basic construction and design of relational databases. Textbook. SPb.: MSA, 1998. 80pp.
  21. I.V.Kotenko, G.A.Rybov, I.B.Saenko. Intelligent systems for telecommunication control. N.I.Burenin (ed.). SPb., MSA, 1996. 150 p. (in Russian).
  22. I.B.Saenko, A.I. Obrezkov. Fundamentals of design and quality evaluation of databases. Textbook. Ulyanovsk: UHMIUC, 1996. 25 pp.
  23. I.B. Saenko, A.I. Obrezkov. DBMS Paradox for Windows version 4.5. Textbook. Ulyanovsk: UHMIUC, 1996. 40pp.
  24. I.V.Kotenko, I.P.Janchenko, A.V.Bogovik. Automation of the telecommunication documents development. A.Y. Runeev (ed.). SPb., MSA, 1995. 150 p. (in Russian).
  25. I.V.Kotenko. Object-oriented programming: Smalltalk/V and Smalltalk/V 286. Application for automation of telecommunication control processes. SPb., MSA, 1995. 294 p. (in Russian).
  26. I.B.Saenko, A.V.Lebedev. Programming in INTEREKSPERT. Textbook. Ulyanovsk: UHMIUC, 1995. 40 pp.
  27. I.V.Kotenko. Logic programming in Prolog. TURBO and PDC PROLOG. SPb., MSA, 1994. 412 p. (in Russian).
  28. I.V.Kotenko. Methods of reasoning in expert systems under the incomplete and contradictory information. SPb., MSA, 1992. 77 p. (in Russian).
  29. I.V.Kotenko. Diagnostics of telecommunication networks. SPb., MSA, 1992. 219 p. (in Russian).
  30. V.I.Antuhov, I.V.Kotenko. Knowledge bases. SPb., MSA, 1991. 86 p. (in Russian).
  31. Programming in Pascal. Textbook. Y.A. Bukhartsev, V.A. Kulikov, A. G. Gutnik, Y.I. Didenko, I.B. Saenko. L.: MSU, 1991. 108pp.

Papers

2017

  1. Igor Kotenko, Andrey Chechulin, Dmitry Komashinsky. Categorisation of web pages for protection against inappropriate content in the internet. International Journal of Internet Protocol Technology (IJIPT), Vol. 10, No. 1, 2017. P.61-71. (Scopus)
  2. Igor Kotenko, Andrey Chechulin, Alexander Branitskiy. Generation of Source Data for Experiments with Network Attack Detection Software // Journal of Physics: Conference Series, 2017. P.236-245. URL: http://iopscience.iop.org/article/10.1088/1742-6596/820/1/012033 (WoS and Scopus)
  3. Dmitry Levshun, Andrey Chechulin. Development of the information search interface in unified repository of multimedia data from field ethnographic expeditions // Universum: Technical science: digital science journal. 2017. ¹ 4(37). URL: http://7universum.com/ru/tech/archive/item/4623 (in Russian).

2016

  1. Dmitry Novozhilov, Igor Kotenko and Andrey Chechulin. Improving the Categorization of Web Sites by Analysis of Html-Tags Statistics to Block Inappropriate Content. Proceedings of the 9th International Symposium on Intelligent Distributed Computing – IDC’2015, Guimarães, Portugal, 7-9 October 2015. DOI 10.1007/978-3-319-25017-5_24. Springer-Verlag, 2016. P.257-263. (Scopus)
  2. Maxim Kolomeec, Andrey Chechulin, Anton Pronoza, and Igor Kotenko. Technique of Data Visualization: Example of Network Topology Display for Security Monitoring. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), Vol.7, No.1, March, 2016. P.41-57. http://jowua.yolasite.com/vol7no1.php (Scopus)
  3. Vasily Desnitsky, Andrey Chechulin, Igor Kotenko, Dmitry Levshun, Maxim Kolomeec. Application of a Technique for Secure Embedded Device Design Based on Combining Security Components for Creation of a Perimeter Protection System. 24th Euromicro International Conference on Parallel, Distributed, and Network-Based Processing (PDP 2016). Heraklion, Crete, Greece, February, 2016. IEEE Computer Society. 2016. P.609-616. (Scopus)
  4. Vasily Desnitsky, Dmitry Levshun, Andrey Chechulin and Igor Kotenko. Design Technique for Secure Embedded Devices: Application for Creation of Integrated Cyber-Physical Security System. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), Vol.7, No.2, June, 2016. P.60-80. http://jowua.yolasite.com/vol7no2.php (Scopus)
  5. Igor Kotenko, Dmitry Levshun, Andrey Chechulin. Event correlation in the integrated cyber-physical security system. Proceedings of the 2016 XIX IEEE International Conference on Soft Computing and Measurements (SCM-2016), IEEE, St. Petersburg, Russia, May 2016. P.484-486. (Scopus)
  6. Maxim Kolomeets, Andrey Chechulin, Igor Kotenko. Visualization Model for Monitoring of Computer Networks Security Based on the Analogue of Voronoi Diagrams. The International Cross Domain Conference and Workshop (CD-ARES 2016). August 31- September 2, 2016. Salzburg, Austria. F. Buccafurri et al. (Eds.): CD-ARES 2016, LNCS 9817, P.141–157, 2016. DOI: 10.1007/978-3-319-45507-5_10 (Scopus)
  7. Igor Kotenko, Elena Doynikova. Dynamical calculation of security metrics for countermeasure selection in computer networks // Proceedings of the 24th Euromicro International Conference on Parallel, Distributed and network-based Processing (PDP 2016). Heraklion, Crete, Greece, 17-19 Feb. 2016. Los Alamitos, California. IEEE Computer Society. 2016. DOI 10.1109/PDP.2016.96. P.558-565. (WoS and Scopus)
  8. Vasily Desnitsky and Igor Kotenko. Automated design, verification and testing of secure systems with embedded devices based on elicitation of expert knowledge // Journal of Ambient Intelligence and Humanized Computing (AHIC), Springer. October 2016, Volume 7, Issue 5, P.705–719. DOI 10.1007/s12652-016-0371-6. http://link.springer.com/article/10.1007/s12652-016-0371-6 (WoS and Scopus)
  9. Elena Doynikova, Igor Kotenko. Countermeasure selection based on the attack and service dependency graphs for security incident management // 10th International Conference on Risks and Security of Internet and Systems : CRiSIS 2015. July 20-22, Mytilene, Lesvos Island, Greece / C. Lambrinoudakis and A. Gabillon (Eds.). Lecture Notes in Computer Science (LNCS), Vol. 9572, Springer, 2016. P.107–124. DOI: 10.1007/978-3-319-31811-0_7. http://link.springer.com/chapter/10.1007/978-3-319-31811-0_7 (WoS and Scopus)
  10. Alexander Branitskiy, Igor Kotenko. Hybridization of computational intelligence methods for attack detection in computer networks // Journal of Computational Science, Elsevier, 2016. (WoS and Scopus). Available online - 1 August 2016. http://www.sciencedirect.com/science/journal/aip/18777503 (WoS and Scopus)
  11. Igor Saenko, Fadey Skorik, Igor Kotenko. Application of Hybrid Neural Networks for Monitoring and Forecasting Computer Networks States // 13th International Symposium on Neural Networks (ISNN 2016). Saint Petersburg. July 6-8, 2016. LNCS, Vol.9719, 2016, P.521–530, DOI: 10.1007/978-3-319-40663-3_60 (WoS and Scopus)
  12. Igor Saenko, Sergey Ageev and Igor Kotenko. Detection of traffic anomalies in multi-service networks based on a fuzzy logical inference // Intelligent Distributed Computing X. Studies in Computational Intelligence. Springer-Verlag, Vol.678. Proceedings of 10th International Symposium on Intelligent Distributed Computing - IDC'2016. Paris, France. 7-9 October 10-12, 2016. Springer-Verlag. 2017. P.79-88. (WoS and Scopus)
  13. Igor Saenko and Igor Kotenko. Reconfiguration of RBAC schemes by genetic algorithms // Intelligent Distributed Computing X. Studies in Computational Intelligence. Springer-Verlag, Vol.678. Proceedings of 10th International Symposium on Intelligent Distributed Computing - IDC'2016. Paris, France. 7-9 October 10-12, 2016. Springer-Verlag. 2017. P.89-98. (WoS and Scopus)
  14. Igor Kotenko, Igor Saenko. An Approach to Aggregation of Security Events in Internet-of-Things Networks Based on Genetic Optimization // The 16th IEEE International Conference on Scalable Computing and Communications (ScaleCom 2016). Toulouse, France. 18-21 July 2016. P.657-664. (WoS and Scopus).
  15. Vasily Desnitsky, Igor Kotenko. Event analysis for security incident management on a perimeter access control system // XIX International Conference on Soft Computing and Measurements (SCM'2016). IEEE Xplore, 2016. P.481-483. DOI: 10.1109/SCM.2016.7519819. (WoS and Scopus)
  16. Igor Kotenko. Guest Editorial: Security in Parallel, Distributed and Network-Based Computing // Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), Vol. 7, No. 2, June 2016. P.1-2. (Scopus)
  17. Igor Saenko and Igor Kotenko. Using Genetic Algorithms for Design and Reconfiguration of RBAC Schemes // 1st International Workshop on Artificial Intelligence for Privacy and Security. PrAISe '16, August 29-30, 2016, The Hague, Netherlands. ACM. 2016. 8 p. ISBN 978-1-4503-4304-6/16/08. DOI: http://dx.doi.org/10.1145/2970030.2970033. (WoS and Scopus)
  18. Igor Saenko, Fadey Skorik and Igor Kotenko. Monitoring and forecasting of computer networks states based on hybrid neural networks. Journal of Instrument Engineering. Vol.59, ¹ 10, 2016. P.795-800. (RISC, Scopus) (in Russian).
  19. Igor Saenko, Oleg Lauta and Igor Kotenko. Using stochastic network conversion technique for modeling of mobile banking attacks. Journal of Instrument Engineering. Vol.59, ¹ 11, 2016. P.928-933. (RISC, Scopus) (in Russian).
  20. Igor Kotenko, Andrey Chechulin, Dmitry Komashinsky. Categorization of web pages for protection against inappropriate content in the Internet // International Journal of Internet Protocol Technology (JIPT), 2016. http://www.inderscience.com/info/ingeneral/forthcoming.php?jcode=ijipt
  21. Elena Doynikova, Igor Kotenko. Security assessment based on attack graphs and open standards for computer networks with mobile components // The 2016 International Symposium on Mobile Internet Security (MobiSec’16). Taichung, Taiwan. July 14-15, 2016. 11 p.
  22. Igor Saenko, Oleg Lauta, Igor Kotenko. Analytical modeling of mobile banking attacks based on a stochastic network conversion technique // The 2016 International Symposium on Mobile Internet Security (MobiSec’16). Taichung, Taiwan. July 14-15, 2016. 10 p. (in Russian).
  23. Elena Doynikova, Igor Kotenko. Security Assessment Based on Attack Graphs and Open Standards for Computer Networks with Mobile Components // Research Briefs on Information & Communication Technology Evolution (ReBICTE), Vol.2, 2016. 11 p. http://rbisyou.wixsite.com/rebicte/volume-2-2016. (in Russian).
  24. Luiza Sayfullina, Emil Eirola, Dmitry Komashinsky, Paolo Palumbo, Juha Karhunen. Android Malware Detection: Building Useful Representations // The IEEE 15th International Conference on "Machine Learning and Applications". Proceedings. Anaheim, California, USA, December 18-20, 2016. P.201-206.
  25. Anton Pronoza, Andrey Chechulin, Igor Kotenko. Mathematical Models of Visualization in SIEM Systems. SPIIRAS Proceedings. 2016. Issue 46. P.90-107. (in Russian).
  26. Andrey Fedorchenko, Dmitry Levshun, Andrey Chechulin, Igor Kotenko. An Analysis of Security Event Correlation Techniques in Siem-Systems. Part 1. SPIIRAS Proceedings. 2016. Issue 47. P.5-27. (in Russian).
  27. Maxim Kolomeec, Andrey Chechulin, Igor Kotenko. Technique for network topology visualization for security monitoring. PJournal of Instrument Engineering. Vol.59, ¹ 10, 2016. P.807-812. DOI 10.17586/0021-3454-2016-59-10-807-812. (in Russian).
  28. Vasily Desnitsky, Andrey Chechulin, Igor Kotenko, Dmitry Levshun, Maxim Kolomeec. Combined Design Technique for Secure Embedded Devices Exemplified by a Perimeter Protection System. SPIIRAS Proceedings. 2016. Issue 48. P.5-31. (in Russian).
  29. Andrey Fedorchenko, Dmitry Levshun, Andrey Chechulin, Igor Kotenko. An Analysis of Security Event Correlation Techniques in Siem-Systems. Part 2. SPIIRAS Proceedings. 2016. Issue 6(49). P.5-27. (in Russian).
  30. Dmitry Novozhilov, Andrey Chechulin, Igor Kotenko. Improving of web-sites categorization on the basis of analysis of HTML-tags statistics for the blocking of inappropriate content. Management-information systems, No 6, 2016. P.65-73. (in Russian).
  31. Alexander Branitskiy, Igor Kotenko. Analysis and Classification of Methods for Network Attack Detection. SPIIRAS Proceedings. 2016. Issue 45. P.207-244. (in Russian).
  32. Evgenia Novikova, Igor Kotenko. Detection of the abnormal activity in the mobile money transfer services using RADViz-visualization. SPIIRAS Proceedings. 2016. Issue 48. P.32-51. (in Russian).
  33. Evgenia Novikova, Igor Kotenko, Eugene Fedotov. Visual data analysis for the anomaly detection in mobile money transfer services. Information Security. Inside, 2016, ¹4, P.40-47; 2016, ¹5, P.72-82. (in Russian).
  34. Elena Doynikova, Igor Kotenko. Techniques and Tool for the Risk Assessment on the base of the Attack Graphs in Security Information and Event Management Systems. Information and Control Systems, 2016, ¹ 5, P.54-65. ISSN 1684-8853.2016. (in Russian).
  35. Igor Kotenko, Dmitry Levshun, Andrey Chechulin, Sergey Bushuev. Event correlation in the integrated cyber-physical security system. XIX International Conference on Soft Computing and Measurements (SCM'2016),Proceedings . Vol. 2, Saint-Petersburg, ETU "LETI". P.327-331. (in Russian).
  36. Andrey Chechulin, Dmitry Novozhilov. Development of a test bed for the efficiency evaluation of intellectual methods for websites classification. International congress "IS&IT16" - International Conference on Artificial Intelligence and Systems. Proceedings. Divnomorskoye, Russia. September 4-11. Taganrog, UFY, 2016. Vol. 2. P.32-37. (in Russian).
  37. Dmitry Levshun, Andrey Chechulin. Mathematical model for description of information objects of different types to organize the search of materials in a single repository of multimedia data from field ethnographic expeditions. LXIII International Theoretical and Practical Conference "Innovations in Science". November 30, 2016. Proceedings. Novosibirsk, 2016. P.21-29. ISBN 2308-6009. (in Russian).
  38. Mikhail Mikhailov, Maxim Kolomeec, Mikhail Bulgakov, Andrey Chechulin. Investigation and determination of general advantages and disadvantages of existing data warehouses types and analysis of applications. Technical sciences – from theory to practice: Proceedings of the 64th International Scientific and Practical Conference – Novosibirsk, SibAK, ¹ 59, 2016. P.22-27. (in Russian).
  39. Vasily Desnitsky, Igor Kotenko, Yan Kopchak. Analysis of events for management of security incidents on the example of access control system. XIX International Conference on Soft Computing and Measurements (SCM'2016),Proceedings, Vol. 2, Saint-Petersburg, ETU "LETI", 2016. P.332-336. (in Russian).
  40. Alexander Branitskiy, Igor Kotenko. Techniques of combining the binary classifiers for identifying the anomalous network connections. 9th Conference on Information Technologies in Control (ITC) . Proceedings. St.Petersburg, Russia. October 4–6, 2016. P.660-664. (in Russian).
  41. Elena Doynikova, Igor Kotenko. Technique for the security assessment of computer networks on the base of attack graphs and service dependency graphs. 9th Conference on Information Technologies in Control (ITC) . Proceedings. St.Petersburg, Russia. October 4–6, 2016. P.694-699. (in Russian).
  42. Elena Doynikova, Igor Kotenko. Technique for countermeasure selection to response on security incidents in computer networks on the base of security metrics. 9th Conference on Information Technologies in Control (ITC) . Proceedings. St.Petersburg, Russia. October 4–6, 2016. P.700-705. (in Russian).
  43. Nikolay Vasilishin, Igor Ushakov, Igor Kotenko. Research of the network traffic analysis algorithms using big data to detect computer attacks. 9th Conference on Information Technologies in Control (ITC) . Proceedings. St.Petersburg, Russia. October 4–6, 2016. P.670-675. (in Russian).
  44. Alexander Branitskiy. Architecture of the distributed system of detection, classification and prevention of network attacks based on signature analysis and computational intelligence methods. 9th Conference on Information Technologies in Control (ITC) . Proceedings. St.Petersburg, Russia. October 4–6, 2016. P.651-655. (in Russian).
  45. Alexander Branitskiy. Modified model of computational immune system based on evolutionary-genetic approach for detection and classification of anomalous network connections. 9th Conference on Information Technologies in Control (ITC) . Proceedings. St.Petersburg, Russia. October 4–6, 2016. P.656-659. (in Russian).
  46. Mikhail Bulgakov, Dmitry Levshun. The main challenges of the protection of physical security systems communication lines. 9th Conference on Information Technologies in Control (ITC) . Proceedings. St.Petersburg, Russia. October 4–6, 2016. P.665-669. (in Russian).
  47. Vasily Desnitsky. Detection of anomalous data from sensors embedded devices based on expert knowledge. 9th Conference on Information Technologies in Control (ITC) . Proceedings. St.Petersburg, Russia. October 4–6, 2016. P.676-679. (in Russian).
  48. Vasily Desnitsky. Implementation of software means for model checking based verification of network data flows. 9th Conference on Information Technologies in Control (ITC) . Proceedings. St.Petersburg, Russia. October 4–6, 2016. P.680-683. (in Russian).
  49. Elena Doynikova. Complex of the security metrics for security assessment of computer networks on the base of attack graphs and service dependency graphs. 9th Conference on Information Technologies in Control (ITC) . Proceedings. St.Petersburg, Russia. October 4–6, 2016. P.688-693. (in Russian).
  50. Maxim Kolomeec. Usage of human's cognitive features for security data visualization. 9th Conference on Information Technologies in Control (ITC) . Proceedings. St.Petersburg, Russia. October 4–6, 2016. P.723-728. (in Russian).
  51. Aleksey Kushnerevich. Aggregation of big data arrays for detection of security events on the basis of distributed stream processing. 9th Conference on Information Technologies in Control (ITC) . Proceedings. St.Petersburg, Russia. October 4–6, 2016. P.729-734. (in Russian).
  52. Dmitry Levshun. The integration technique of access control system into integrated security system. 9th Conference on Information Technologies in Control (ITC) . Proceedings. St.Petersburg, Russia. October 4–6, 2016. P.735-739. (in Russian).
  53. Igor Saenko, Mikhail Biryukov. Method of integration of local access control schemes for heterogeneous resources of a common information space. 9th Conference on Information Technologies in Control (ITC) . Proceedings. St.Petersburg, Russia. October 4–6, 2016 . P.758-762. (in Russian).
  54. Igor Saenko, Aleksey Kushnerevich, and Sergey Bushuyev. Application of the distributed parallel computing framework for preliminary processing of big data on security events in the Internet of things. 9th Conference on Information Technologies in Control (ITC) . Proceedings. St.Petersburg, Russia. October 4–6, 2016.P.763-767. (in Russian).
  55. Igor Saenko, Oleg Lauta. Assessment of cyber-stability of computer networks on the basis of results of stochastic simulation of the computer attacks. 9th Conference on Information Technologies in Control (ITC) . Proceedings. St.Petersburg, Russia. October 4–6, 2016. P. 768-773. (in Russian).
  56. Andrey Fedorchenko. Analysis of security events correlation features in SIEM-systems. 9th Conference on Information Technologies in Control (ITC) . Proceedings. St.Petersburg, Russia. October 4–6, 2016. P.774-777. (in Russian).
  57. Andrey Fedorchenko. Features of security events correlation technique for target attacks detection. 9th Conference on Information Technologies in Control (ITC) . Proceedings. St.Petersburg, Russia. October 4–6, 2016. P.778-781. (in Russian).
  58. Igor Saenko, Aleksey Brunilin, Vyacheslav Efimov and Sergey Yasinskiy. Organization of information exchange of heterogeneous automated systems: ontological approach. Information and Space. ¹ 2, 2016, P.60-64. (in Russian).
  59. Andrey Kiy, Igor Saenko, and Sergey Bushuyev. Approach to access control of information resources based on the user application analysis. Technical sciences – from theory to practice. 2016, ¹ 3(51), Novosibirsk, SibAK, P.25-29. (in Russian).
  60. Valery Kuvaev, Igor Saenko, and Sergey Bushuyev. Model of the assessment of operational accessibility to resources of the common information space. Technical sciences – from theory to practice. 2016, ¹ 5(53)Part I, Novosibirsk, SibAK, P.88-93. (in Russian).
  61. Igor Saenko, Andrey Kiy, and Sergey Bushuyev. Method of access control to information resources on the basis of the analysis of activity of applications. International scientific and practical conference "Science today: facts, tendencies, forecasts "[Text]:Proceedings, Vologda, 22 June, 2016: in 2 parts. Part 1.2016. P.69-71. (in Russian).
  62. Vladislav Alexandrov, Vasily Desnitsky, Dmitry Chaly. Development and security analysis of a fragment of Internet of Things system. Modeling and Analysis of Information Systems. Volume 23, issue 26. 2016. P.767-776. (in Russian).
  63. Vasily Desnitsky, Dmitry Chaly. The client-server based approach to protection of Internet of things software systems. Technical sciences – from theory to practice. 2016, ¹ 11 (59), Novosibirsk, SibAK, P.6-13. (in Russian).
  64. Igor Saenko and Igor Kotenko. Genetic algorithms for Boolean matrix factorization in relation to access control problems in computer networks. 15th National Conference on Artificial Intelligence with International Participation (CAI 2016). October, 3-7, 2016. Smolensk, Russia. Proceedings of the conference. Vol.3, P.98-106. (in Russian).
  65. Andrey Chechulin, Maxim Kolomeec. Application of new visualization techniques for security metrics of computer networks. 18th International Conference “RusCrypto” on Cryptology, Steganography, Digital Signature and Security Systems. Solnechnogorsk, Russia. March 22-25, 2016. http://www.ruscrypto.ru/ (in Russian).
  66. Maxim Kolomeec, Andrey Chechulin. Development of new graphical models for networks visualization. 6th international forum on practical security Positive Hack Days. Moscow, Russia. May 17-18, 2016. http://www.phdays.ru/ (in Russian).
  67. Dmitry Levshun, Andrey Chechulin, Igor Kotenko. Architecture of integrated security system. 25th All-Russian Conference “Methods and technical tools of information security” (MTTIS 2016)”. Proceedings. St.Petersburg, Russia. 4-7 July, 2016. P.53-54. (in Russian).
  68. Andrey Chechulin. The main types of the network changes that should be taken into account during the construction of an analytical attack models. 25th All-Russian Conference “Methods and technical tools of information security” (MTTIS 2016)”. Proceedings. St.Petersburg, Russia. 4-7 July, 2016. P.114-115. (in Russian).
  69. Evgenia Deshevih, Igor Ushakov, Andrey Chechulin. Integration of SIEM systems with security event correlation systems based on Big Data technology. 9th Conference on Information Technologies in Control (ITC) . Proceedings. St.Petersburg, Russia. October 4–6, 2016. P.684-687. (in Russian).
  70. Dmitry Novozhilov, Andrey Chechulin. Development of the platform for experiments with the websites classification methods. 9th Conference on Information Technologies in Control (ITC) . Proceedings. St.Petersburg, Russia. October 4–6, 2016. P.740-749. (in Russian).
  71. Anton Pronoza, Andrey Chechulin, Ian Kopchak. Approach for network security visualization evaluation based on ratio of informativity and ease of perception. 9th Conference on Information Technologies in Control (ITC) . Proceedings. St.Petersburg, Russia. October 4–6, 2016. P.750-757. (in Russian).
  72. Andrey Chechulin. Tehniques for attack models building and modification for network security analysis. 9th Conference on Information Technologies in Control (ITC) . Proceedings. St.Petersburg, Russia. October 4–6, 2016. P.782-785. (in Russian).
  73. Maxim Kolomeec, Igor Kotenko, Andrey Chechulin. Visualization model for cybersecurity monitoring system based on analogue of Voronoi diagrams. 15th National Conference on Artificial Intelligence with International Participation (CAI 2016). October, 3-7, 2016. Smolensk, Russia. Proceedings of the conference. P.180-187. (in Russian).
  74. Dmitry Levshun, Andrey Chechulin, Igor Kotenko. Secure inter-controller interaction based on I2C protocol. XV Ąnniversary Saint-Petersburg International Conference "Regional informatics-2016 (RI-2016)". Proceedings. St. Petersburg, 2016. P.169-170. (in Russian).
  75. Dmitry Novozhilov, Andrey Chechulin. Metrics for the analysis of the structural features of the web pages by machine learning methods. XV Ąnniversary Saint-Petersburg International Conference "Regional informatics-2016 (RI-2016)". Proceedings. St. Petersburg, 2016. P.184-185. (in Russian).
  76. Mikhail Mikhailov, Andrey Chechulin. Scanner based on clustering and correlation metdods for data warehouses. XV Ąnniversary Saint-Petersburg International Conference "Regional informatics-2016 (RI-2016)". Proceedings. St. Petersburg, 2016. P.181. (in Russian).
  77. Mikhail Bulgakov, Andrey Chechulin. Development of hardware and software for the simulation of the security incidents in railway systems. XV Ąnniversary Saint-Petersburg International Conference "Regional informatics-2016(RI-2016)". Proceedings. St. Petersburg, 2016. P.151. (in Russian).
  78. Maxim Kolomeec, Andrey Chechulin, Yan Kopchak. Development of a graphical interface for visualization of computer network security systems. XV Ąnniversary Saint-Petersburg International Conference "Regional informatics-2016 (RI-2016)" Proceedings. St. Petersburg, 2016. P.166-167. (in Russian).
  79. Dmitry Levshun, Andrey Chechulin. Comparison of approaches for the construction of a database for the organization of research materials in a unified repository for multimedia data from field ethnographic expeditions. XV Ąnniversary Saint-Petersburg International Conference "Regional informatics-2016 (RI-2016)". Proceedings. St. Petersburg, 2016. P.330-331. (in Russian).
  80. Nikita Dubrovin, Igor Ushakov, Andrey Chechulin. Application of Big Data Technology in Security Information and Event Management Systems // 5th International Conference on Advanced Infotelecommunication ("ICAIT-2016"). March, 10-11, 2016. Collection of scientific papers. Saint-Petersburg, 2016. P.348-353. (in Russian).
  81. Andrey Chechulin, Maxim Kolomeec, Igor Kotenko, Sergey Busuev. Architecture of software prototype of heterogeneous data visualization system. XXIX International scientific conference "Mathematical Methods in Technique and Technologies - MMTT-29", 31 May - 3 June, 2016, Proceedings.St. Petersburg State Institute of Technology, St. Petersburg, Russia, 2016, Vol.4. P.142-144. (in Russian).
  82. Vasily Desnitsky, Andrey Chechulin. Information flow verification technique for Internet of things systems. XV Ąnniversary Saint-Petersburg International Conference "Regional informatics-2016 (RI-2016)". Proceedings. St. Petersburg, 2016. P.156-157. (in Russian).
  83. Andrey Fedorchenko, Igor Kotenko. Techniques of security events correlation for target attacks detecting. 18th Conference “RusCrypto” on Cryptology, Steganography, Digital Signature and Security Systems. Solnechnogorsk, Russia. March 22-25, 2016. http://www.ruscrypto.ru/ . (in Russian).
  84. Vasily Desnitsky, Dmitry Levshun. The choice and combination of elements for the construction of an integrated system of cyber-physical security // 18th International Conference “RusCrypto” on Cryptology, Steganography, Digital Signature and Security Systems. Solnechnogorsk, Russia. March 22-25, 2016. http://www.ruscrypto.ru/ . (in Russian).
  85. Sergey Ageev and Igor Saenko. Models of information security risk management in multiservice communication systems on the basis of fuzzy situation-dependent networks. 18th International Conference “RusCrypto” on Cryptology, Steganography, Digital Signature and Security Systems. Solnechnogorsk, Russia. March 22-25, 2016. http://www.ruscrypto.ru /. (in Russian).
  86. Igor Saenko, Aleksey Kushnerevich, Igor Kotenko and Yan Kopchak. Program framework of the distributed parallel stream data processing for security monitoring in Internet-of-things networks. Proceedings of the XXIX International scientific conference "Mathematical Methods in Technique and Technologies - MMTT-29", 31 May - 3 June, 2016, St. Petersburg State Institute of Technology, St. Petersburg, Russia, 2016, Vol.4, P. 90-94. (in Russian).
  87. Igor Saenko and Valery Kuvayev. Models and technique of the assessment and support of operational accessibility of resources in the common information space. Proceedings of the XXIX International scientific conference "Mathematical Methods in Technique and Technologies - MMTT-29", 31 May - 3 June, 2016, St. Petersburg State Institute of Technology, St. Petersburg, Russia, 2016, Vol.6, P. 139–142. (in Russian).
  88. Aleksey Brunilin, Mikhail Biryukov and Igor Saenko. Model and method of use of ontologies for access control management in the common information space. Proceedings of the XXIX International scientific conference "Mathematical Methods in Technique and Technologies - MMTT-29", 31 May - 3 June, 2016, St. Petersburg State Institute of Technology, St. Petersburg, Russia, 2016, Vol.6, P. 122–125. (in Russian).
  89. Elena Doynikova, Andrey Fedorchenko. Techniques of the automated response on the security incidents during information and security events management in the systems of interacting services. XXIX International Conference "Mathematical methods in technics and technology - ĢĢŅŅ-29", May 31 ģą˙ - June 3, 2016, St. Petersburg State Technological Institute, St.Petersburg, Russia. (in Russian).
  90. Igor Saenko, Igor Kotenko and Sergey Kruglov. Approach to the solution of “a role mining problem” when forming the RBAC model on the basis of genetic algorithms. 25th All-Russian Conference “Methods and technical tools of information security” (MTTIS 2016)”. Proceedings. St.Petersburg, Russia. 4-7 July, 2016. P.113. (in Russian).
  91. Igor Saenko, Aleksey Kushnerevich, Igor Kotenko and Yan Kopchak. Approach to implementation of parallel stream data handling for security monitoring of the Internet of Things network. 25th All-Russian Conference “Methods and technical tools of information security” (MTTIS 2016)”. Proceedings. St.Petersburg, Russia. 4-7 July, 2016. P.38-39. (in Russian).
  92. Alexander Branitskiy. Artificial immune systems as a concept for detection and classification of attacks under conditions of dynamically changing traffic. 25th All-Russian Conference “Methods and technical tools of information security” (MTTIS 2016)”. Proceedings. St.Petersburg, Russia. 4-7 July, 2016. P.12-13. (in Russian).
  93. Vasily Desnitsky. An approach to information flow verification of Internet of things systems. 25th All-Russian Conference “Methods and technical tools of information security” (MTTIS 2016)”. Proceedings. St.Petersburg, Russia. 4-7 July, 2016. P.34-35. (in Russian).
  94. Elena Doynikova. Models, techniques and algorithms for calculation of the information systems security metrics in scope of the hierarchical system of the security metrics. 25th All-Russian Conference “Methods and technical tools of information security” (MTTIS 2016)”. Proceedings. St.Petersburg, Russia. 4-7 July, 2016. P.45-47. (in Russian).
  95. Oleg Lauta, Mikhail Kotsynyak and Igor Saenko. Development of models of the computer attacks on the basis of a method of topological conversion of stochastic networks. 25th All-Russian Conference “Methods and technical tools of information security” (MTTIS 2016)”. Proceedings. St.Petersburg, Russia. 4-7 July, 2016. P.104-105. (in Russian).
  96. Evgenia Novikova. Generation of the patterns of objects movement in the dynamic environment. 25th All-Russian Conference “Methods and technical tools of information security” (MTTIS 2016)”. Proceedings. St.Petersburg, Russia. 4-7 July, 2016. P.106-108. (in Russian).
  97. Andrey Fedorchenko. Security events correlation for target attacks detecting. 25th All-Russian Conference “Methods and technical tools of information security” (MTTIS 2016)”. Proceedings. St.Petersburg, Russia. 4-7 July, 2016. P.32-33. (in Russian).
  98. Igor Saenko, Igor Kotenko and Sergey Kruglov. Genetic approach to reconfiguring of diagrams of role access in the common information space. International congress "IS&IT'16" - International Conference on Artificial Intelligence and Systems. Proceedings. Divnomorskoye, Russia. September 4-11. Taganrog, UFY, 2016. Vol.1. P.13-18. (in Russian).
  99. Elena Doynikova, Igor Kotenko. Technique and software tool for the countermeasure selection in computer networks on the base of the dynamical recalculation of security metrics. International congress "IS&IT'16" - International Conference on Artificial Intelligence and Systems. Proceedings. Divnomorskoye, Russia. September 4-11. Taganrog, UFY, 2015. Vol. 2. P.271-276. (in Russian).
  100. Vasily Desnitsky. Detection of anomalous data from sensors in the information and telecommunication systems with embedded devices. International congress "IS&IT'16" - International Conference on Artificial Intelligence and Systems. Proceedings. Divnomorskoye, Russia. September 4-11. Taganrog, UFY, 2016. Vol.1. P.217-223. (in Russian).
  101. Igor Saenko, Aleksey Kushnerevich and Igor Kotenko. Implementation of the distributed parallel computing framework for collecting and preprocessing the big monitoring data in cyber-physical systems. International Congress on Computer Science: Information Systems and Technologies (CSIST'2016). Proceedings. Minsk, 24 – 27 October 2016. P.641-645. (in Russian).
  102. Nickolay Komashinsky, Igor Kotenko. Analysis of the approaches for the detection of the targeted attacks. XV Ąnniversary Saint-Petersburg International Conference "Regional informatics-2016 (RI-2016)". Proceedings. St. Petersburg, 2016. P.167-168. (in Russian).
  103. Igor Kotenko, Igor Ushakov. Using big data for monitoring of security incidents. XV Ąnniversary Saint-Petersburg International Conference "Regional informatics-2016 (RI-2016)". Proceedings. St. Petersburg, 2016. Š.168-169. (in Russian).
  104. Eugene Merkushev, Igor Kotenko. Analysis of properties of cloud computing security ecosystem. XV Ąnniversary Saint-Petersburg International Conference "Regional informatics-2016 (RI-2016)". Proceedings. St. Petersburg, 2016. P.179-180. (in Russian).
  105. Anton Pronoza, Igor Kotenko. Actual problems of the big data visualization in the security information and events management systems. XV Ąnniversary Saint-Petersburg International Conference “Regional informatics-2016” (“RI-2016”). Proceedings. St. Petersburg, 2016. P.189-190. (in Russian).
  106. Anton Pronoza, Igor Kotenko. Analysis of the big data visualization models for the task of monitoring of the large-scale computer networks. XV Ąnniversary Saint-Petersburg International Conference "Regional informatics-2016 (RI-2016)". Proceedings. St. Petersburg, 2016. P.188-189. (in Russian).
  107. Igor Saenko and Igor Kotenko. Models and methods of the visual analysis of diagrams and policies of access control for the common information space resources. XV Ąnniversary Saint-Petersburg International Conference "Regional informatics-2016 (RI-2016)". Proceedings. St. Petersburg, 2016. P.192-193. (in Russian).
  108. Alexander Branitskiy. Combined approach to detection of network attacks based on signature analysis and computational intelligence methods. XV Ąnniversary Saint-Petersburg International Conference "Regional informatics-2016 (RI-2016)". Proceedings. St. Petersburg, 2016. P.150. (in Russian).
  109. Alexander Branitskiy, Maxim Colomeec. Development of visualization system of computer networks based on Voronoi diagram. XV Ąnniversary Saint-Petersburg International Conference "Regional informatics-2016 (RI-2016)". Proceedings. St. Petersburg, 2016. P.150-151. (in Russian).
  110. Vasily Desnitsky, Vladislav Alexandrov. An intruder model for information and telecommunication Internet of Things systems. XV Ąnniversary Saint-Petersburg International Conference "Regional informatics-2016 (RI-2016)". Proceedings. St. Petersburg, 2016. P.155-156. (in Russian).
  111. Elena Doynikova. Security assessment on the base of graphs and open standards for the networks with mobile components // XV Ąnniversary Saint-Petersburg International Conference "Regional informatics-2016 (RI-2016)". Proceedings. St. Petersburg, 2016. P.158-159. (in Russian).
  112. Igor Saenko, Aleksey Kushnerevich and Sergey Bushuyev. Framework for the parallel distributed traffic analysis in the computer networks for security incidents detection . XV Ąnniversary Saint-Petersburg International Conference "Regional informatics-2016 (RI-2016)". Proceedings. St. Petersburg, 2016. P.193-194. (in Russian).
  113. Andrey Fedorchenko. Host-based technique of security events correlation. XV Ąnniversary Saint-Petersburg International Conference "Regional informatics-2016 (RI-2016)". Proceedings. St. Petersburg, 2016. P.199-200. (in Russian).
  114. Vladimir Komashinskiy, Dmitry Komashinskiy, Oleg Mihalev, Vyacheslav Yudaev. Cognitive Cyber-Physical Systems of Transport Safety // International Practical Conference "Russian Transport: Problems and Perspectives - 2016". 29-30 November, 2016. Proceedings, vol. 2. SPb., 2016. P.148-153. (in Russian).

2015

  1. Andrey Fedorchenko, Igor Kotenko and Andrey Chechulin. Design of integrated vulnerabilities database for computer networks security analysis. 23th Euromicro International Conference on Parallel, Distributed, and Network-Based Processing (PDP 2015). Turku, Finland, March, 2015. 1066-6192/15 © 2015 IEEE DOI 10.1109/PDP.2015.112 IEEE Computer Society. 2015. P.559-566. (Scopus, WoS)
  2. Igor Kotenko, Andrey Fedorchenko and Andrey Chechulin. Integrated repository of security information for network security evaluation. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), Vol.6, No.2, June, 2015. P.41-57. http://jowua.yolasite.com/vol6no2.php (Scopus)
  3. Igor Kotenko, Andrey Chechulin, Dmitry Komashinsky. Evaluation of Text Classification Techniques for Inappropriate Web Content Blocking // The IEEE 8th International Conference on “Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications” (IDAACS'2015). Proceedings. Warsaw, Poland, September 24-26, 2015. P.412-417. (Scopus)
  4. Andrey Chechulin, Igor Kotenko. Attack Tree-based Approach for Real-Time Security Event Processing. Automatic Control and Computer Sciences, Allerton Press, Inc., Vol. 49, ¹ 8, 2015. P.701–704. (Scopus)
  5. Igor Kotenko, Elena Doynikova. Countermeasure selection in SIEM systems based on the integrated complex of security metrics // Proceedings of the 23th Euromicro International Conference on Parallel, Distributed and network-based Processing (PDP 2015). Turku, Finland. 4-6 March 2015. Los Alamitos, California. IEEE Computer Society. 2015. P.567-574. (WoS, Scopus)
  6. Igor Kotenko, Elena Doynikova. The CAPEC based generator of attack scenarios for network security evaluation // The IEEE 8th International Conference on “Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications” (IDAACS'2015). Proceedings. Warsaw, Poland, September 24-26, 2015. P.436-441. (WoS, Scopus)
  7. Elena Doynikova, Igor Kotenko. Countermeasure selection based on the attack and service dependency graphs for security incident management // 10th International Conference on Risks and Security of Internet and Systems : CRiSIS 2015. July 20-22, Mytilene, Lesvos Island, Greece / Lecture Notes in Computer Science (LNCS), Springer, 2015. (WoS, Scopus)
  8. Alexander Branitskiy, Igor Kotenko. Network attack detection based on combination of neural, immune and neuro-fuzzy classifiers. The 18th IEEE International Conference on Computational Science and Engineering (IEEE CSE2015). Porto, Portugal. October 21-23, 2015, P.152-159. (WoS, Scopus)
  9. Vasily Desnitsky, Igor Kotenko, Sergey Nogin. Detection of Anomalies in Data for Monitoring of Security Components in the Internet of Things. XVIII International Conference on Soft Computing and Measurements (SCM'2015). IEEE Xplore, 2015. P.189-192. DOI: 10.1109/SCM.2015.7190452. (Scopus)
  10. Vasily Desnitsky, Igor Kotenko. Design and Verification of Protected Systems with Integrated Devices Based on Expert Knowledge. Automatic Control and Computer Sciences, Allerton Press, Inc., Vol. 49, No. 8, 2015. P.648–652. (Scopus)
  11. Igor Kotenko, Igor Saenko. Improved genetic algorithms for solving the optimization tasks under design of access control schemes for computer networks. International Journal of Bio-Inspired Computation, Inderscience Enterprises Ltd., Vol. 7, No. 2, 2015, P.98-110. (Scopus)
  12. Igor Kotenko, Igor Saenko. Reconfiguring the access schemes in virtual computer networks of the Internet of things by genetic algorithms. Intelligent Distributed Computing IX. Studies in Computational Intelligence. Springer-Verlag, Vol.616. Proceedings of 9th International Symposium on Intelligent Distributed Computing - IDC'2015. Guimaraes, Portugal. 7-9 October 2015. Springer-Verlag. P.155-165. (WoS, Scopus)
  13. Igor Kotenko, Igor Saenko, Sergey Ageev, Yan Kopchak. Abnormal Traffic Detection in networks of the Internet of things based on fuzzy logical inference. XVIII International Conference on Soft Computing and Measurements (SCM'2015). IEEE Xplore, 2015. P.5-8. DOI: 10.1109/SCM.2015.7190394. (Scopus)
  14. Igor Kotenko, Igor Saenko, Fadey Skorik, Sergey Bushuev. Neural Network Approach to forecast the States of Elements of the Internet of Things. XVIII International Conference on Soft Computing and Measurements (SCM'2015). IEEE Xplore, 2015. P.133-135. DOI: 10.1109/SCM.2015.7190434. (Scopus)
  15. Igor Kotenko, Igor Saenko, Sergey Ageev. Security Risks Management in the Internet of Things based on Fuzzy Logic Inference. The 2015 IEEE International Symposium on Recent Advances of Trust, Security and Privacy in Computing and Communications (RATSP 2015) in conjunction with The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15). Helsinki, Finland. 20-22 August 2015. Los Alamitos, California. IEEE Computer Society. 2015. P.654-659. (Scopus)
  16. Igor Kotenko, Igor Saenko. The Genetic Approach for Design of Virtual Private Networks. The 18th IEEE International Conference on Computational Science and Engineering (IEEE CSE2015). Porto, Portugal. October 21-23, 2015, P.168-175. (WoS, Scopus)
  17. Maxim Kolomeec, Andrey Chechulin and Igor Kotenko. Methodological Primitives for Phased Construction of Data Visualization Models. Journal of Internet Services and Information Security (JISIS), Vol.5, No.4, November, 2015. P.60-84. http://www.jisis.org/vol5no4.php
  18. Luiza Sayfullina, Emil Eirola, Dmitry Komashinsky, Paolo Palumbo, Yoan Miche, Amaury Lendasse, Juha Karhunen. Efficient Detection of Zero-day Android Malware Using Normalized Bernoulli Naive Bayes // The 14th IEEE International Conference on "Trust, Security and Privacy in Computing and Communications". Proceedings. Helsinki, Finland, August 20-22, 2015. P.198-205.
  19. Pronoza E., Vagunova E., Pronoza A. Construction of a Russian Paraphrase Corpus: Unsupervised Paraphrase Extraction. Proceedings of the 9th Russian Summer School in Information Retrieval, August 24–28, 2015, Saint-Petersburg, Russia, (RuSSIR 2015, Young Scientist Conference), Springer CCIS 573, P.146-157.
  20. Igor Kotenko, Andrey Chechulin, Dmitry Komashinsky. Automated categorization of web-sites for inappropriate content blocking. Problems of information security. Computer systems. ¹ 2, 2015. P.69-79. (in Russian).
  21. Maxim Kolomeec, Andrey Chechulin, Igor Kotenko. Review of Methodological Primitives for the Phased Construction of Data Visualization Model .SPIIRAS Proceedings. 2015. Issue 42. P.232-257. (in Russian).
  22. Dmitry Levshun, Andrey Chechulin. Problems of construction a single repository of multimedia data from field ethnographic expeditions. Technical sciences – from theory to practice. 2015, ¹46, Novosibirsk, SibAK, P.25-30. (in Russian).
  23. Dmitry Levshun. Security event correlation process decomposition. Technical sciences – from theory to practice. 2015, ¹46, Novosibirsk, SibAK, P.31-39. (in Russian).
  24. Igor Kotenko, Evgenia Novikova, Andrey Chechulin. Visualization of security metrics for security monitoring and event management. Problems of information security. Computer systems. ¹ 4, 2015. P.42-47. (in Russian).
  25. Valery Kuvaev, Andrey Chechulin, Viacheslav Efimov, Konstantin Lizhinkin. Options for the design a unified information space for the integration of heterogeneous automated systems. Information and Space. Scientific and technical journal, ¹ 4, 2015, P.83-87. (in Russian).
  26. Elena Doynikova, Igor Kotenko, Andrey Chechulin. Dynamic Assessment of Computer Networks Security in SIEM Systems . Information Technology Security, ¹ 3, 2015. P.33-42. (in Russian).
  27. Igor Kotenko, Elena Doynikova. Methods of selecting countermeasures on the basis of an integrated system of indicators of security in systems of information management and security events // Information management systems, ¹ 3, 2015. P.60-69. DOI:10.15217/issn1684-8853.2015.3.60. (in Russian).
  28. Vasily Desnitsky, Elena Doynikova. Architecture and effectiveness evaluation of software tool for configuring security components of systems with embedded devices // Technical sciences – from theory to practice, ¹ 47, 2015. P.9-13. (in Russian).
  29. Elena Doynikova, Vasily Desnitsky. Generator of the random attack sequences for the computer network on the base of the CAPEC attack patterns // Technical sciences – from theory to practice, ¹ 46, 2015. P.11-16. (in Russian).
  30. Andrey Fedorchenko, Igor Kotenko, Andrey Chechulin. Development of Information Access and Management Services for Integrated Vulnerability Database. Security of Information Technologies, ¹ 4, 2015. P.26-32. (in Russian).
  31. Alexander Branitskiy, Igor Kotenko. Construction of neural network and immune cell intrusion detection system. Problems of information security, Computer systems, ¹ 4, 2015. P.23-27. (in Russian).
  32. Alexander Branitskiy, Igor Kotenko. Network attack detection based on aggregation of neural, immune and neuro-fuzzy classifier. Information management systems, ¹ 4, 2015. P.69-77. DOI:10.15217/issn1684-8853.2015.4.69. (in Russian).
  33. Vasily Desnitsky, Igor Kotenko. Formation of the expertise to develop secure systems with embedded devices. Problems of information security, Computer systems, ¹ 4, 2015. P.35-41. (in Russian).
  34. Igor Saenko, Igor Kotenko. Using genetic optimization and visual analysis tools for access schema design in virtual local area networks. Information technology and computer systems, ¹ 1, 2015. P.33-46. (in Russian).
  35. Igor Kotenko, Igor Saenko, Sergey Ageev, Yan Kopchak. Detection of anomalous traffic in the networks of the Internet of Things, based on fuzzy logical deduction. XVIII International Conference on Soft Computing and Measurements (SCM'2015),Proceedings. Vol. 1, Saint-Petersburg, ETU "LETI", 2015. P.9–14. (in Russian).
  36. Igor Kotenko, Igor Saenko, Fadey Skorik, Sergey Bushuev. Neural network approach for predicting the state of the elements of the Internet of things. XVIII International Conference on Soft Computing and Measurements (SCM'2015),Proceedings. Vol. 1, Saint-Petersburg, ETU "LETI", 2015. P.395-399. (in Russian).
  37. Igor Saenko, Valery Kuvayev, Maxim Biryukov. The general architecture of the common access control system for diverse resources in uniform information and communication space. Technical sciences – from theory to practice, ¹ 11 (47), 2015. P.70-75. (in Russian).
  38. Igor Saenko, Valery Kuvayev, Maxim Biryukov. Use of ontologies for management of access differentiation to diverse resources of common information and communication space. Technical sciences – from theory to practice, ¹ 11 (47), 2015. P.76-80. (in Russian).
  39. Vasily Desnitsky. Configuring security components of embedded devices on the base of a heuristic approach. Technical sciences – from theory to practice, ¹ 46, 2015. P.16-20. (in Russian).
  40. Vasily Desnitsky. A technique for evaluation resource consumption of security components for systems with embedded devices. Technical sciences – from theory to practice, ¹ 47, 2015. P.14-18. (in Russian).
  41. Igor Kotenko, Igor Saenko, Andrey Chechulin. Development of new generation of security information and event management systems. 24th All-Russian Conference “Methods and technical tools of information security” (MTTIS 2015)”. Proceedings. St.Petersburg, Russia. 29 June - 02 July, 2015. P.123-124. (in Russian).
  42. Anton Pronoza, Andrey Chechulin. Model of information gathering process for a heterogeneous network structure investigation for visualization component of security information and event management systems.24th All-Russian Conference “Methods and technical tools of information security” (MTTIS 2015)”. Proceedings. St.Petersburg, Russia. 29 June - 02 July, 2015. P.125-127. (in Russian).
  43. Andrey Chechulin, Anton Pronoza. Classification and analysis of network objects' relations types for further visualization. 24th All-Russian Conference “Methods and technical tools of information security” (MTTIS 2015)”. Proceedings. St.Petersburg, Russia. 29 June - 02 July, 2015. P.132-133. (in Russian).
  44. Andrey Chechulin. Classification and models development for network objects relation representation. International congress IS&IT15 - International Conference on Artificial Intelligence and Systems. Proceedings. Divnomorskoye, Russia. September 2-9, 2015. Mosńow, Fizmathlit, 2015. Vol. 2. P.165-170. (in Russian).
  45. Dmitry Smirnov, Andrey Chechulin. Security data correlation in IoT networks. 17th International Conference “RusCrypto” on Cryptology, Steganography, Digital Signature and Security Systems. Solnechnogorsk, Russia. March 22-25, 2015. http://www.ruscrypto.ru/ (in Russian).
  46. Vasily Desnitsky. Models of the development process for combined protection mechanisms for information and telecommunication systems with embedded devices. International congress "IS&IT15" - International Conference on Artificial Intelligence and Systems. Proceedings. Divnomorskoye, Black Sea Coast, Russia. September 2-9. Moskow, Fizmathlit, 2015. Vol. 2. P.113-118. (in Russian).
  47. Andrey Fedorchenko. Rule-oriented method for correlation of security events in SIEM. IX Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2015)", Saint-Petersburg, October 28-30, 2015. The proceedings of conference, 2015. P.86-87. (in Russian).
  48. Branitskiy Alexander. Methods of computational intelligence for detection and classification of anomalies in network traffic. IX Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2015)", Saint-Petersburg, October 28-30, 2015. The proceedings of conference, 2015. P.61-62. (in Russian).
  49. Vasily Desnitsky. A model of a configuration of embedded device security components. IX Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2015)", Saint-Petersburg, October 28-30, 2015. The proceedings of conference, 2015. P.65-66. (in Russian).
  50. Vasily Desnitsky. A technique for evaluation of embedded device security components. // IX Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2015)", Saint-Petersburg, October 28-30, 2015. The proceedings of conference, 2015. P.66-67. (in Russian).
  51. Vladislav Aleksandrov, Vasily Desnitsky, Sergey Bushuev. Development and analysis if a fragment of a secure Internet of Things system IX Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2015)", Saint-Petersburg, October 28-30, 2015. The proceedings of conference, 2015. P.56-57. (in Russian).
  52. Evgeniya Deshevyh, Igor Ushakov, Igor Kotenko. An overview of tools and platforms for processing big data for information security monitoring tasks. IX Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2015)", Saint-Petersburg, October 28-30, 2015. The proceedings of conference, 2015. P.67. (in Russian).
  53. Nikita Dubrovin, Igor Ushakov, Igor Kotenko. Implementation of a Hadoop based prototype to analyze big data. IX Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2015)", Saint-Petersburg, October 28-30, 2015. The proceedings of conference, 2015. P.69-70. (in Russian).
  54. Krylov Konstantin, Igor Ushakov, Igor Kotenko. Analysis of techniques of application the big data concept for monitoring computer network security. IX Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2015)", Saint-Petersburg, October 28-30, 2015. The proceedings of conference, 2015. P.75-76. (in Russian).
  55. Igor Saenko, Sergey Ganya. Technical principles and methodological approaches to the organization and deployment of solutions for aggregation, normalization, analysis and visualization of large volumes of heterogeneous data for monitoring security in Internet of Things networks. IX Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2015)", Saint-Petersburg, October 28-30, 2015. The proceedings of conference, 2015. P.84-85. (in Russian).
  56. Igor Saenko, Igor Kotenko. Models and methods for evaluating the effectiveness of a system of access control differentiation to resources of the information space. IX Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2015)", Saint-Petersburg, October 28-30, 2015. The proceedings of conference, 2015. P.85-75. (in Russian).
  57. Maxim Kolomeec, Andrey Chechulin, Igor Kotenko. Visualization of security settings of computer networks using a Voronov's diagram. IX Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2015)", Saint-Petersburg, October 28-30, 2015. The proceedings of conference, 2015. P.73-74. (in Russian).
  58. Dmitry Levshun, Andrey Chechulin, Maxim Kolomeec, Igor Kotenko. An architecture of access management system to a room on the base of contactless smart cards. IX Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2015)", Saint-Petersburg, October 28-30, 2015. The proceedings of conference, 2015. P.76. (in Russian).
  59. Dmitry Novozhilov, Andrey Chechulin. Development of software tools to support the experiments on a web site classification. IX Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2015)", Saint-Petersburg, October 28-30, 2015. The proceedings of conference, 2015. P.80-81. (in Russian).
  60. Anton Pronoza, Andrey Chechulin, Sergey Bushuev. A model for presentation of heterogeneous structure of information objects of a computer network for a subsystem of SIEM visualization. IX Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2015)", Saint-Petersburg, October 28-30, 2015. The proceedings of conference, 2015. P.82-83. (in Russian).
  61. Sergey Bushuev, Andrey Chechulin, Anton Pronoza. Classification of sources of data on network objects and their relationships. IX Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2015)", Saint-Petersburg, October 28-30, 2015. The proceedings of conference, 2015. P.62-63. (in Russian).
  62. Andrey Chechulin. Mathematical models and algorithms for modeling attacks and the development of countermeasures in near-real time. IX Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2015)", Saint-Petersburg, October 28-30, 2015. The proceedings of conference, 2015. P.90. (in Russian).
  63. Vladimir Komashinskiy, Dmitriy Komashinskiy. The Cognitive Metaphor in the Evolution of Telecommunication and Industrial Network Infrastructures or The First Steps Towards the Post-Information Society // Communication Technologies and Equipment Magazine, Vol. 1, 2015. P.62-67. (in Russian).
  64. Elena Doynikova, Igor Kotenko. Countermeasure selection for the management of the computer networks security on the base of the integrated system of security metrics .24th All-Russian Conference “Methods and technical tools of information security” (MTTIS 2015)”. Proceedings. St.Petersburg, Russia. 29 June - 02 July, 2015. P.114-115. (in Russian).
  65. Elena Doynikova. Attacks generator on the base of the classification of the attack patterns CAPEC. 24th All-Russian Conference “Methods and technical tools of information security” (MTTIS 2015)”. Proceedings. St.Petersburg, Russia. 29 June - 02 July, 2015. P.71-72. (in Russian).
  66. Elena Doynikova. Application of dependency graphs of services within a task of analysis of computer network security for criticality assessment of system resources and reasonable choice of protective measures. IX Saint-Petersburg Interregional conference "Information security of regions of Russia (ISRR-2015)", Saint-Petersburg, October 28-30, 2015. The proceedings of conference, 2015. P.68-69. (in Russian).
  67. Elena Doynikova. Methods and algorithms development for generation of attack scenarios on the network for its security level evaluation. 20th St.Petersburg assembly of the young scientists and specialists. Proceedings.St.Petersburg, 2015. P.133. (in Russian).
  68. Chechulin A.A. Models and methods development for protection against unwanted and harmful information on the Internet // 20th St.Petersburg assembly of the young scientists and specialists. Proceedings.St.Petersburg, 2015. P.133. (in Russian).
  69. ElenaDoynikova, IgorKotenko. Analysis and application of the security metrics that are based on the attack graphs and service dependencies graphs in the SIEM-systems. IX Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2015)", Saint-Petersburg, October 28-30, 2015. The proceedings of conference, 2015. P.104–112. (in Russian).
  70. Andrey Fedorchenko. The combined correlation process of security events in SIEM-systems. 24th All-Russian Conference “Methods and technical tools of information security” (MTTIS 2015)”. Proceedings. St.Petersburg, Russia. 29 June - 02 July, 2015. P.102-103. (in Russian).
  71. Alexander Branitskiy, Vladimir Polushin. Construction of neural network and immune cell intrusion detection system. 17th International Conference “RusCrypto`2015”, Solnechnogorsk, March 17-20, 2015. http://www.ruscrypto.ru/ (in Russian).
  72. Alexander Branitskiy, Igor Kotenko. Methods of combining the binary classifiers for problems of detection and classification of network attacks. 24th All-Russian Conference “Methods and technical tools of information security” (MTTIS 2015)”. Proceedings. St.Petersburg, Russia. 29 June - 02 July, 2015. P.68. (in Russian).
  73. Alexander Branitskiy. Intrusion detection on the basis of combination of signature-based methods and mechanisms of machine learning. 24th All-Russian Conference “Methods and technical tools of information security” (MTTIS 2015)”. Proceedings. St.Petersburg, Russia. 29 June - 02 July, 2015. P.67. (in Russian).
  74. Vasily Desnitsky, Igor Kotenko, Sergey Nogin. Detecting anomalies in the data for monitoring protection components of the Internet of things. XVIII International Conference on Soft Computing and Measurements (SCM'2015),Proceedings. Vol. 2, Saint-Petersburg, ETU "LETI", 2015. P.17-22. (in Russian).
  75. Sergey Bushuev, Vasily Desnitsky. Formation of expertise for the development of secure systems, "Internet of Things". 17th International Conference “RusCrypto`2015”, Solnechnogorsk, March 17-20, 2015. http://www.ruscrypto.ru/ (in Russian).
  76. Vasily Desnitsky. A technique for evaluation resource consumption of security components of information and telecommunication systems with embedded devices. 24th All-Russian Conference “Methods and technical tools of information security” (MTTIS 2015)”. Proceedings. St.Petersburg, Russia. 29 June - 02 July, 2015. P.69-70. (in Russian).
  77. Vasily Desnitsky. A technique for revelation of functional and non-functional incompatibilities of security components of embedded devices of information and telecommunication systems. 24th All-Russian Conference “Methods and technical tools of information security” (MTTIS 2015)”. Proceedings. St.Petersburg, Russia. 29 June - 02 July, 2015. P.70-71. (in Russian).
  78. Igor Saenko, Igor Kotenko. Adaptive change of policies and schemes of of access control to the resources of an unified information space. 24th All-Russian Conference “Methods and technical tools of information security” (MTTIS 2015)”. Proceedings. St.Petersburg, Russia. 29 June - 02 July, 2015. P.127-128. (in Russian).
  79. Sergey Ageev, D. Vasil'ev, Igor Saenko. Security Management protected multi-service network of special-purpose. 24th All-Russian Conference “Methods and technical tools of information security” (MTTIS 2015)”. Proceedings. St.Petersburg, Russia. 29 June - 02 July, 2015. P.106-107. (in Russian).
  80. Igor Kotenko, Igor Saenko. The genetic approach to designing a virtual private network in secure information space. International congress "IS&IT15" - International Conference on Artificial Intelligence and Systems. Proceedings. Divnomorskoye, Russia. September 2-9, 2015. Mosńow, Fizmathlit, 2015. Vol. 2. P.320-325. (in Russian).
  81. Alexander Mozhaev, Alexander Nozik, Alexander Strukov, Andrey Chechulin. Modern trends in structural and logical analysis of reliability and cybersecurity of Automated Process Control Systems (APCS). International Science School "Modeling and Analysis of Safety and Risk in Complex Systems" (MABR-2015). St.Petersburg, Russia, November 17-19, 2015. (in Russian).
  82. Dmitry Levshun, Maxim Kolomeec. Experience in developing of a distributed perimeter protection system based on elements of Internet of Things network. International scientific school "Incident management and countering targeted cyber-physical attacks in distributed large-scale critical systems (IM&CTCPA 2015)". SPIIRAS, St. Petersburg, 26-28 November 2015. http://www.comsec.spb.ru/imctcpa15/. (in Russian).

2014

  1. Igor Kotenko, Elena Doynikova and Andrey Chechulin. Security metrics based on attack graphs for the Olympic Games scenario. 22th Euromicro International Conference on Parallel, Distributed, and Network-Based Processing (PDP 2014). Torino, Italy, February, 2014. 1066-6192/14 © 2014 IEEE DOI 10.1109/PDP.2014.113 IEEE Computer Society. 2014. P.561-568. (WoS, Scopus)
  2. Igor Kotenko, Andrey Chechulin, Andrey Shorov, Dmitry Komashinsky. Analysis and Evaluation of Web Pages Classification Techniques for Inappropriate Content Blocking. P. Perner (Ed.): 14th Industrial Conference on Data Mining (ICDM 2014), Lecture Notes in Artificial Intelligence (LNAI 8557), DOI 10.1007/978-3-319-08976-8. P.39–54. ISSN 0302-9743, ISBN 978-3-319-08975-1. (WoS, Scopus)
  3. Igor Kotenko, Igor Saenko. A Genetic Approach for Virtual Computer Network Design // Intelligent Distributed Computing VIII. Studies in Computational Intelligence. Springer-Verlag, Vol.570. Proceedings of 8th International Symposium on Intelligent Distributed Computing - IDC'2014. September 3-5, 2014, Madrid, Spain. Springer-Verlag. P.95-105. (WoS, Scopus)
  4. Igor Kotenko, Andrey Shorov, Andrey Chechulin, Evgenia Novikova. Dynamical Attack Simulation for Security Information and Event Management. V. Popovich et al. (eds.), Information Fusion and Geographic Information Systems (IF&GIS 2013), Lecture Notes in Geoinformation and Cartography, DOI: 10.1007/978-3-642-31833-7_14, Springer-Verlag, Berlin, Heidelberg, 2014. P.219-234.
  5. Igor Kotenko, Andrey Chechulin. Fast Network Attack Modeling and Security Evaluation based on Attack Graphs // Journal of Cyber Security and Mobility, Vol.3, No.1, 2014. P.27–46.
  6. Igor Kotenko, Igor Saenko, Andrey Chechulin. Proactive management of security information and events in the information and telecommunication systems. Questions of Radioelectronics. Issue 1 (3). Moscow, ZNII "Elektronika", 2014. P.170-180. ISSN: 0233-9950 (in Russian).
  7. Andrey Fedorchenko, Andrey Chechulin, Igor Kotenko. Investigation of open vulnerability databases and their applicability evaluation for computer networks security evaluation systems. Management-information systems, 2014, ¹5, P.72-79. ISSN 1684-8853. (in Russian).
  8. Andrey Chechulin, Igor Kotenko. Attack Graph Construction for Security Events Analysis. Security of Information Technologies, ¹ 3, 2014, P.135-141. (in Russian).
  9. Andrey Chechulin, Igor Kotenko. Real-time security events processing using an approach based on the attack trees analysis. Problems of information security. Computer systems. ¹ 3, 2014. P.56-59. (in Russian).
  10. Andrey Fedorchenko, Andrey Chechulin, Igor Kotenko. Analytical overview of open vulnerabilities databases. Problems of information security. Computer systems. ¹ 3, 2014. P.131-135. (in Russian).
  11. Andrey Fedorchenko, Andrey Chechulin, Igor Kotenko. Construction of the integrated vulnerability database. Proceedings of the universities. Journal of Instrument Engineering. Vol.57, ¹ 11, 2014. ISSN 0021-3454. P.62-67. (WoS) (in Russian).
  12. Vasily Desnitsky, Andrey Chechulin. Generalized intruder model and verification of information systems with embedded devices. Technical sciences – from theory to practice. 2014, ¹39, Novosibirsk, SibAK, P.7-21. (in Russian).
  13. Anton Noskov, Andrey Chechulin. Investigation heuristic approach to detect attacks on the telecommunications network based on data mining techniques. Proceedings of SPIIRAS. Issue 6 (37). SPb: Nauka, 2014. (in Russian).
  14. Igor Kotenko, Olga Polubelova, Igor Saenko. Logical Inference Framework for Security Management in Geographical Information Systems. V. Popovich et al. (eds.), Information Fusion and Geographic Information Systems (IF&GIS 2013), Lecture Notes in Geoinformation and Cartography, DOI: 10.1007/978-3-642-31833-7_14, Springer-Verlag, Berlin, Heidelberg, 2014. P.203-218.
  15. Andrey Fedorchenko, Andrey Chechulin, Igor Kotenko. Analytical review of open vulnerability databases. 16th Conference “RusCrypto” on Cryptology, Steganography, Digital Signature and Security Systems. Solnechnogorsk, Russia. March 25-28, 2014. http://www.ruscrypto.ru/ (in Russian).
  16. Andrey Chechulin, Igor Kotenko. Security event handling in real time mode using an approach based on the attack trees analysis. 16th Conference “RusCrypto” on Cryptology, Steganography, Digital Signature and Security Systems. Solnechnogorsk, Russia. March 25-28, 2014. http://www.ruscrypto.ru/ (in Russian).
  17. Andrey Chechulin, Igor Kotenko. Application of Big Data processing methods for computer network infrastructure security.7th Russian Multiconference on Problems in Control (MPC). Conference on Information Technologies in Control (ITC).Proceedings. St.Petersburg, Russia. October 7–9, 2014. P.614-617. (in Russian).
  18. Andrey Fedorchenko, Andrey Chechulin, Igor Kotenko. Integrated vulnerabilities database for computer networks security evalution systems. 7th Russian Multiconference on Problems in Control (MPC). Conference on Information Technologies in Control (ITC).Proceedings. St.Petersburg, Russia. October 7–9, 2014. P.638-641. (in Russian).
  19. Andrey Chechulin, Igor Kotenko. Design of the system for users protection against inappropriate content in the Internet. 7th Russian Multiconference on Problems in Control (MPC). Conference on Information Technologies in Control (ITC).Proceedings. St.Petersburg, Russia. October 7–9, 2014. P.642-647. (in Russian).
  20. Andrey Chechulin. The main challenges in the design of an electronic catalog of field data. Maklaevskie chtenya-2014. St. Petersburg, Russia. April 15-16, 2014. http://www.kunstkamera.ru/science/konferencii_i_seminary/2014/maklaevskie_chteniya2014/ (in Russian).
  21. Andrey Chechulin, Igor Kotenko, Vasily Desnitsky. Features of the information security systems design in cyber-physical systems. 23th All-Russian Conference “Methods and technical tools of information security” (MTTIS 2014)”. Proceedings. St.Petersburg, Russia. 30 June - 03 July, 2014. P.67-69. (in Russian).
  22. Vasily Desnitsky, Andrey Chechulin. Verification of information and telecommunication systemms with embedded devices on the base of generalized intuder model. 23th All-Russian Conference “Methods and technical tools of information security” (MTTIS 2014)”. Proceedings. St.Petersburg, Russia. 30 June - 03 July, 2014. P.66-67. (in Russian).
  23. Dmitry Novozhilov, Andrey Chechulin. Web-page text language recognition techniques. XIV Saint-Petersburg International Conference “Regional informatics-2014” (“RI-2014”). Proceedings. St. Petersburg, 2014. Š.155-156. (in Russian).
  24. Dmitry Levshun, Andrey Chechulin. Construction of the classification scheme for the existing methods of security events correlation. XIV Saint-Petersburg International Conference “Regional informatics-2014” (“RI-2014”). Proceedings. St. Petersburg, 2014. Š.148-149. (in Russian).
  25. Andrey Chechulin, Dmitry Komashinkiy. Approach for classification of websites in foreign languages in the Internet. XIV Saint-Petersburg International Conference “Regional informatics-2014” (“RI-2014”). Proceedings. St. Petersburg, 2014. Š.169-170. (in Russian).
  26. Andrey Chechulin, Igor Kotenko. Software prototype of analytical attacks modeling component for security information and events management systems. XIV Saint-Petersburg International Conference “Regional informatics-2014” (“RI-2014”). Proceedings. St. Petersburg, 2014. Š.170-171. (in Russian).
  27. Alexandra Kasatkina, Andrey Chechulin. Multimedia database on Ifugao folklore (Philippines): specifying a problem and selecting solutions. All-Russian Research-to-Practice Conference "Native minorities in dominating society: Practice of applied studies and efficient tools of ethnic". Kemerovo, 17-18 October 2014. Proceedings. Kemerovo, 2014. Š.312-317. (in Russian).
  28. Philipp Nesteruk, Lesya Nesteruk, Igor Kotenko. Creation of a Fuzzy Knowledge Base for Adaptive Security Systems // Proceedings of the 22th Euromicro International Conference on Parallel, Distributed and network-based Processing (PDP 2014). Turin, Italy. 12th - 14th February, 2014. Los Alamitos, California. IEEE Computer Society. 2014. P.574-577. (WoS, Scopus)
  29. Igor Kotenko, Elena Doynikova. Security Assessment of Computer Networks based on Attack Graphs and Security Events // The 2014 Asian Conference on Availability, Reliability and Security (AsiaARES 2014). In conjunction with ICT-EurAsia 2014. Bali, Indonesia, April 14th – 17th, 2014. / Linawati et al. (Eds.): ICT-EurAsia 2014, Lecture Notes in Computer Science (LNCS), Vol.8407. IFIP International Federation for Information Processing (2014). Springer. 2014, P.462-471. (WoS, Scopus)
  30. Kotenko I., Shorov A. Simulation of bio-inspired security mechanisms against network infrastructure attacks // Intelligent Distributed Computing VIII. Studies in Computational Intelligence. Springer-Verlag, Vol.570. Proceedings of 8th International Symposium on Intelligent Distributed Computing - IDC'2014. September 3-5, 2014, Madrid, Spain. Springer-Verlag. P.127-133. (WoS, Scopus)
  31. Igor Kotenko, Elena Doynikova. Security Evaluation for Cyber Situational Awareness // The 2014 IEEE 6th International Symposium on Cyberspace Safety and Security (CSS 2014). August 20-22, 2014, Paris, France. 2014. Los Alamitos, California. IEEE Computer Society. 2014. P.1229-1236. (WoS, Scopus)
  32. Igor Kotenko, Evgenia Novikova. Visualization of Security Metrics for Cyber Situation Awareness // The 1st International Software Assurance Workshop (SAW 2014). In conjunction with the 9th International Conference on Availability, Reliability and Security (ARES 2014). September 8nd – 12th, 2014. Fribourg, Switzerland. IEEE Computer Society. 2014. P.506-513. (WoS, Scopus)
  33. Evgenia Novikova, Igor Kotenko. Visual Analytics for Detecting Anomalous Activity in Mobile Money Transfer Services // International Cross Domain Conference and Workshops (CD-ARES 2014). September 8nd – 12th, 2014. Fribourg, Switzerland. Lecture Notes in Computer Science (LNCS), Vol.8708. Springer-Verlag. 2014, P.63-78. (WoS, Scopus)
  34. Vasily Desnitsky, Igor Kotenko. Expert Knowledge based Design and Verification of Secure Systems with Embedded Devices // 4rd IFIP International Workshop on Security and Cognitive Informatics for Homeland Defense (SeCIHD 2014). September 8nd – 12th, 2014. Fribourg, Switzerland. Lecture Notes in Computer Science (LNCS), Vol.8708. Springer-Verlag. 2014. P.194-210. (WoS, Scopus)
  35. Igor Kotenko, Elena Doynikova. Evaluation of Computer Network Security based on Attack Graphs and Security Event Processing // Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), Vol.5, No.3, September 2014. P.14-29. (Scopus)
  36. Igor Saenko, Igor Kotenko. Design of Virtual Local Area Network Scheme based on Genetic Optimization and Visual Analysis // Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), Vol.5, No.4, December 2014. (Scopus)
  37. Andrey Shorov, Igor Kotenko. The Framework for Simulation of Bio-inspired Security Mechanisms Against Network Infrastructure Attacks // The Scientific World Journal, Volume 2014 (2014), Article ID 172583, 11 pages. http://dx.doi.org/10.1155/2014/172583. (WoS, IF=1.730, Scopus)
  38. Igor Kotenko, Igor Saenko. Creating New Generation Cybersecurity Monitoring and Management Systems // Herald of the Russian Academy of Sciences, 2014, Vol.84, No.6. ISSN 1019-3316. DOI: 10.1134/S1019331614060033 (Scopus IF=0.170, WoS)
  39. Igor Kotenko, Igor Saenko. The proposals about ontological representation and hybrid data storage for security events in the automated control system of railway transport // Technical science - from theory to practice, ¹ 29, 2013. Novosibirsk, SibAK, 2013. P.28-32. (in Russian).
  40. Igor Kotenko, Igor Saenko. Proposals on the logical inference implementation for cyber security management in the automated control system of railway transport // Natural and mathematical science in the modern world. 2014, ¹ 14. Novosibirsk, SibAK, P.46-50. (in Russian).
  41. Igor Kotenko, Igor Saenko. The technique for verification of security policies in the multilevel intelligent system of integrated protection of railway transport. Technical science - from theory to practice. Novosibirsk, SibAK, 2014. ¹ 30. P.18-22. (in Russian).
  42. Igor Kotenko, Elena Doynikova. Calculation and analysis of the security metrics on the base of the attack graphs and service dependencies. Problems of information security. Computer systems, ¹ 2, 2014. P.19-36. (in Russian).
  43. Vasily Desnitsky, Igor Kotenko. Design and verification of secure systems with embedded devices on the base of expert knowledge Problems of information security. Computer systems. ¹ 3, 2014. P.16-22. (in Russian).
  44. Igor Kotenko and Igor Saenko. Creating New-Generation Cybersecurity Monitoring and Management Systems. Herald of the Russian Academy of Sciences, Vol. 84, ¹ 11, 2014, P.993–1001 (in Russian).
  45. Igor Kotenko, Igor Saenko, Rafael Yusupov. New generation of the security incidents’ monitoring and management systems // Nauchno-tekhnicheskie vedomosti SPbGPU. Informatics. Telecommunications. Control. SPbGPU, 2014, ¹ 3 (198), P.7-18. (in Russian).
  46. Igor Kotenko, Elena Doynikova. Monitoring of the current security situation and security decisions support in the computer network on the base of the system of the security metrics . Journal of Instrument Engineering Ņ.57, ¹ 10, 2014. P.72-77. ISSN 0021-3454. (in Russian).
  47. Vasily Desnitsky, Igor Kotenko. The use of expert knowledge in development of secure systems with embedded devices. Information Technologies and Computing Systems, ¹ 4, 2014, P.58-73. (in Russian).
  48. Igor Kotenko, Igor Saenko. About the tasks of cybersecurity in ‘e-city’ infrastructures on the basis of artificial intelligence methods. 7th Russian Multiconference on Problems in Control (MPC). Conference on Information Technologies in Control (ITC).Proceedings. St.Petersburg, Russia. October 7–9, 2014. P.618-622. ISBN 978-5-91995-042-4. (in Russian).
  49. Vasily Desnitsky. Verification of network information flows for the systems with embedded devices on the base of expert knowledge. 7th Russian Multiconference on Problems in Control (MPC). Conference on Information Technologies in Control (ITC).Proceedings. St.Petersburg, Russia. October 7–9, 2014. P.596-600. (in Russian).
  50. Elena Doynikova. Security assessment in the information systems and information security incidents response considering current security situation. 7th Russian Multiconference on Problems in Control (MPC). Conference on Information Technologies in Control (ITC).Proceedings. St.Petersburg, Russia. October 7–9, 2014. P.601-604. ISBN 978-5-91995-042-4. (in Russian).
  51. Igor Saenko, Valery Kuvayev. About using artificial intelligent methods for access control to resources of the common information space of the heterogeneous automated systems. 7th Russian Multiconference on Problems in Control (MPC). Conference on Information Technologies in Control (ITC).Proceedings. St.Petersburg, Russia. October 7–9, 2014. P.631-637. ISBN 978-5-91995-042-4. (in Russian).
  52. Sergey Ageev, Igor Saenko. Information security risk management in the protected multi-service special purpose network on the basis of intelligent multi-agents. 7th Russian Multiconference on Problems in Control (MPC). Conference on Information Technologies in Control (ITC).Proceedings. St.Petersburg, Russia. October 7–9, 2014. P.556-562. ISBN 978-5-91995-042-4. (in Russian).
  53. Vasily Desnitsky. Conceptual combined model of the protection system of embedded devices. Innovations in the science. 2014. Novosibirsk, SibAK, ¹38, Š.55-59. ISSN: 2308-6009. (in Russian).
  54. Vasily Desnitsky. Development of knowledge model for design and secure embedded devices. Natural and mathematical science in the modern world. 2014, ¹23, P.35-40. (in Russian).
  55. Sergey Ageev, Igor Saenko, Yury Egorov, A.Gladkih, A.Bogdanov. Intelligent hierarchical management of the information security risks in protected special purpose multi-service networks. Automation of the control processes. Is. ¹3 (37), 2014. ISSN 1991-2927. P.78-88. (in Russian).
  56. Valery Kuvayev, Igor Saenko. Conceptual foundations for an integration of the heterogeneous information resources of the enterprise in a common information space. Economics and management problems in commerce and industry, 2014, ¹ 7 (007). P.101-104. ISSN 2309-3064. (in Russian).
  57. Igor Saenko, Valery Kuvayev, Sergey Alyshev. An approach to design the quality indicators system for common information space. Natural and mathematical science in the modern world. 2014, ¹ 14. Novosibirsk, SibAK, P.51-56. (in Russian).
  58. Igor Kotenko, Evgenia Novikova. The models and techniques of a visual data analysis for task solution of the cyber security // 16th Conference “RusCrypto” on Cryptology, Steganography, Digital Signature and Security Systems. Solnechnogorsk, Russia. March 25-28, 2014. http://www.ruscrypto.ru/ (in Russian).
  59. Vasily Desnitsky. Design and verification of security mechanisms for systems with embedded devices on the base of expert knowledge. 16th Conference “RusCrypto” on Cryptology, Steganography, Digital Signature and Security Systems. Solnechnogorsk, Russia. March 25-28, 2014. http://www.ruscrypto.ru/ (in Russian).
  60. Igor Kotenko, Igor Saenko. On the construction of an multilevel intelligent information security system for the automated systems of railway transport. Intelligent systems on the transport. IV International scientific-practical Conference «IntellectTrans-2014». St. Petersburg,Proceedings. Petersburg State Communications’ University. 2014. P.21. (in Russian).
  61. Igor Kotenko, Igor Saenko. On the construction of a multilevel intelligent information security system for the automated systems of railway transport. IV International scientific-practical Conference «IntellectTrans-2014». St. Petersburg,Proceedings. Petersburg State Communications’ University. 2014. P.196-203. (in Russian).
  62. Igor Kotenko, Rafael Yusupov. Cybersecurity monitoring and management systems of a new generation for information security in critical infrastructures. XVII All-Russian scientific-practical Conference "Actual security and protection problems". Saint-Petersburg, April 1–4, 2014. (in Russian).
  63. Igor Kotenko, Evgenia Novikova. Visual analytics guard of the information security. International Forum on practical security Positive Hack Days. Moscow. May 21-22, 2014. http://www.phdays.ru (in Russian).
  64. Igor Saenko, Igor Kotenko. Fundamentals of the construction of the perspective security monitoring and management systems for a protection of the critical information objects. International scientific-practical conference "Theoretical and practical information security problems". June 19, 2014. Minsk, Academy of the Ministry of Internal Affairs, Belarus Republic, 2014. (in Russian).
  65. Andrey Fedorchenko, Andrey Chechulin, Igor Kotenko. The integrated database of vulnerabilities. International Scientific and Practical Conference "Theoretical and applied problems of information security." June 19, 2014, Minsk, Academy of MIA Republic of Belarus, 2014. (in Russian).
  66. Andrey Chechulin. The analysis and classification of a possible changes occurring in a computer network and their influence on trees of attacks. International Scientific and Practical Conference "Theoretical and applied problems of information security." June 19, 2014, Minsk, Academy of MIA Republic of Belarus, 2014. (in Russian).
  67. Philipp Nesteruk. Specifics of the two-level organization of adaptive systems of information security. International Scientific and Practical Conference "Theoretical and applied problems of information security." June 19, 2014, Minsk, Academy of MIA Republic of Belarus, 2014. (in Russian).
  68. Elena Doynikova. Calculation of the security metrics in the security monitoring and management systems // International science and practical conference "Theoretical and applied problems of the information security". June 19, 2014, Minsk, Police Academy, the Republic of Belarus, 2014. (in Russian).
  69. Vasily Desnitsky, Elena Doynikova. Development of the defence components for the embedded devices considering expert knowledge // International science and practical conference "Theoretical and applied problems of the information security". June 19, 2014, Minsk, Police Academy, the Republic of Belarus, 2014. (in Russian).
  70. Igor Kotenko, Igor Saenko. About an architecture of the multilevel intelligent information security system for the automated systems of railway transport. 23th All-Russian Conference “Methods and technical tools of information security” (MTTIS 2014)”. Proceedings. St.Petersburg, Russia. 30 June - 03 July, 2014. P.97-98. (in Russian).
  71. Vasily Desnitsky, Igor Kotenko. Configuring information systems with embedded devices to provide complex security on railway transport. 23th All-Russian Conference “Methods and technical tools of information security” (MTTIS 2014)”. Proceedings. St.Petersburg, Russia. 30 June - 03 July, 2014. P.89-90. (in Russian).
  72. Vasily Desnitsky, Igor Kotenko. Combined protection model of information and telecommunication systems of Internet of Things concept. 23th All-Russian Conference “Methods and technical tools of information security” (MTTIS 2014)”. Proceedings. St.Petersburg, Russia. 30 June - 03 July, 2014. P.65-66. (in Russian).
  73. Andrey Fedorchenko. The analysis of vulnerabilities on temporal metrics based on the open database of vulnerabilities X-Force. 23th All-Russian Conference “Methods and technical tools of information security” (MTTIS 2014)”. Proceedings. St.Petersburg, Russia. 30 June - 03 July, 2014. P.104-105. (in Russian).
  74. Elena Doynikova. Approach to the security assessment on the base of the attack graphs in the security information and events management systems. 23th All-Russian Conference “Methods and technical tools of information security” (MTTIS 2014)”. Proceedings. St.Petersburg, Russia. 30 June - 03 July, 2014. P.90-91. (in Russian).
  75. Sergey Ageev, Igor Saenko. Intelligent information security risk management methods of multi service communication networks. 23th All-Russian Conference “Methods and technical tools of information security” (MTTIS 2014)”. Proceedings. St.Petersburg, Russia. 30 June - 03 July, 2014. P.59-60. (in Russian).
  76. Valery Kuvayev, Igor Saenko An approach to solving the task of the access control in heterogeneous information space. 23th All-Russian Conference “Methods and technical tools of information security” (MTTIS 2014)”. Proceedings. St.Petersburg, Russia. 30 June - 03 July, 2014. P.33-34. (in Russian).
  77. Igor Kotenko, Igor Saenko. A system of logical inference and verification of security policies in automated systems of railway transport. International congress IS&IT,14 - International Conference on Artificial Intelligence and Systems.Proceedings. Moskow, Fizmathlit. 2014. Vol.2. P.271-276. 978-5-9221-1572-8. (in Russian).
  78. Igor Saenko, Igor Kotenko. Genetic approach to virtual network design. International congress IS&IT,14 - International Conference on Artificial Intelligence and Systems.Proceedings. Moskow, Fizmathlit. 2014. Vol.2. P.35-40. ISBN 978-5-9221-1572-8. (in Russian).
  79. Igor Kotenko, Igor Saenko. Intelligent system for cyber security monitoring and incident management. 14-th national conference on artificial intelligence with international participation (KAI-2014), September 24–27, 2014, Kazan, Russia. Proceedings, Vol.3. Kazan: Publ. RIC «Scool», 2014. P.219-227. (in Russian).
  80. Elena Doynikova., Igor Kotenko. Analysis and application of the security metrics in the SIEM-systems on the base of the attack graphs and service dependencies // VIII Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2013)", Saint-Petersburg, October 23-25, 2013. The proceedings of conference, 2013. (in Russian).
  81. Vasily Desnitsky. Analysis of perspective systems with embedded devices to form expert knowledge in the field of design secure information and telecommunication systems. XIV Saint-Petersburg International Conference “Regional informatics-2014” (“RI-2014”). Proceedings. St. Petersburg, 2014. P.130. (in Russian).
  82. Vasily Desnitsky, Igor Kotenko. Conceptual combined model of embedded device protection system and its application to configuring components of multi-level intellectual system of complex security on railway transport. XIV Saint-Petersburg International Conference “Regional informatics-2014” (“RI-2014”). Proceedings. St. Petersburg, 2014. P.131. (in Russian).
  83. Elena Doynikova, Igor Kotenko. Security assessment in the RR automated management systems // XIV Saint-Petersburg International Conference “Regional informatics-2014” (“RI-2014”). Proceedings. St. Petersburg, 2014 . P.132-133. (in Russian).
  84. Elena Doynikova. Decision support for the countermeasures selection in the information systems on the base of the complex of the security metrics // XIV Saint-Petersburg International Conference “Regional informatics-2014” (“RI-2014”). Proceedings. St. Petersburg, 2014. P.132. (in Russian).
  85. Andrey Fedorchenko. The techniques of integration database of vulnerabilities for improvement of the analysis of computer networks protection. XIV Saint-Petersburg International Conference “Regional informatics-2014” (“RI-2014”). Proceedings. St. Petersburg, 2014. P.165-166. (in Russian).
  86. Andrey Fedorchenko. Survey of mechanisms of security events correlation in SIEM. XIV Saint-Petersburg International Conference “Regional informatics-2014” (“RI-2014”). Proceedings. St. Petersburg, 2014. P.166. (in Russian).
  87. Sergey Ageev, Igor Saenko. Information security risk evaluation and management in protected multi-service networks on the basis of the artificial intelligent methods. XIV Saint-Petersburg International Conference “Regional informatics-2014” (“RI-2014”). Proceedings. St. Petersburg, 2014. P.116-117. (in Russian).
  88. Igor Kotenko, Igor Saenko. Decision support on information security in the automated control systems of railway transport on the basis of the ontology data modelling. XIV Saint-Petersburg International Conference “Regional informatics-2014” (“RI-2014”). Proceedings. St. Petersburg, 2014. P.144. (in Russian).
  89. Igor Kotenko, Igor Saenko. Models and methods for a visual analysis of Big Data and security events in the automated control systems of railway transport. XIV Saint-Petersburg International Conference “Regional informatics-2014” (“RI-2014”). Proceedings. St. Petersburg, 2014. P.143. (in Russian).
  90. Igor Kotenko, Igor Saenko, Andrey Chechulin. Proactive management of information and security events in network NGN. Seminar of the International Telecommunication Union "Transition developing countries with existing networks to next generation network (NGN): technical, economic, legal and political aspects", St. Petersburg, St. Petersburg GUT Bonch-Bruyevich. 23-25 June 2014. (in Russian).
  91. Andrey Chechulin, Igor Kotenko. Attack Graph Construction for Security Events Analysis. 4th international forum on practical security Positive Hack Days. Moscow, Russia. May 21-22, 2014. http://www.phdays.ru/ (in Russian).
  92. Alexey Bashmakov, Anton Pronoza. Encrypted containers detection techniques for computer forensics. XIV Saint-Petersburg International Conference “Regional informatics-2014” (“RI-2014”). Proceedings. St. Petersburg, 2014. P.120. (in Russian).

2013

  1. Igor Kotenko, Andrey Chechulin. A Cyber Attack Modeling and Impact Assessment Framework. 5th International Conference on Cyber Conflict 2013 (CyCon 2013). Proceedings. IEEE and NATO COE Publications. 4-7 June 2013, Tallinn, Estonia. 2013. P.119-142. (WoS, Scopus)
  2. Igor Kotenko, Igor Saenko, Olga Polubelova and Elena Doynikova. The Ontology of Metrics for Security Evaluation and Decision Support in SIEM Systems. The 2nd International Workshop on Recent Advances in Security Information and Event Management (RaSIEM 2013). In conjunction with the 8th International Conference on Availability, Reliability and Security (ARES 2013). September 2nd – 6th, 2013. Regensburg, Germany. IEEE Computer Society. 2013. P.638-645. (Scopus)
  3. Igor Kotenko, Andrey Chechulin. Computer Attack Modeling and Security Evaluation based on Attack Graphs. The IEEE 7th International Conference on “Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications” (IDAACS'2013). Proceedings. Berlin, Germany, September 12-14, 2013. P.614-619. (Scopus)
  4. Igor Kotenko, Elena Doynikova. Security metrics for risk assessment of distributed information systems. The IEEE 7th International Conference on “Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications” (IDAACS'2013). Proceedings. Berlin, Germany, September 12-14, 2013. P.646-650. (Scopus)
  5. Igor Kotenko, Igor Saenko, Olga Polubelova, Andrey Chechulin. Design and Implementation of a Hybrid Ontological-Relational Data Repository for SIEM systems. Future internet, Vol. 5, ¹3, 2013. P.355-375. ISSN 1999-5903. doi:10.3390/fi5030355.
  6. Igor Kotenko, Olga Polubelova, Andrey Chechulin. Design of the ontology based data model for the network attack modeling system. Proceedings of SPIIRAS. Issue 3 (26). St.Petersburg, Nauka, 2013. P.26-39. (in Russian).
  7. Andrey Chechulin. Technique of rapid construction, modification and analysis of attack trees. Proceedings of SPIIRAS. Issue 3 (26). St.Petersburg, Nauka, 2013. P.40-53. (in Russian).
  8. Igor Kotenko, Elena Doynikova, Andrey Chechulin. Dynamical recalculation of the security metrics on the example of attack potentiality. Proceedings of SPIIRAS. Issue 7 (30). St. Petersburg, Nauka, 2013. P.26-39. ISSN: 2078-9181. (in Russian).
  9. Igor Kotenko, Andrey Chechulin. Usage of attack graphs for network security evaluation and security events processing. High availability systems, ¹3 (9), 2013. P.103-111. (in Russian).
  10. Dmitry Komashinskiy, Igor Kotenko, Andrey Chechulin, Andrey Shorov. Automatic system for categorization of websites for blocking web pages with inappropriate.High availability systems, ¹3 (9), 2013. P.119-127. (in Russian).
  11. Andrey Chechulin. Technique of attack graphs building for systems of security event analysis. Innovations in Science, ¹16-1, 2013. Novosibirsk, SibAK, 2013. Š.156-160. (in Russian).
  12. Andrey Chechulin. Technique of attack graphs building for systems of security event analysis. XVI International Theoretical and Practical Conference "Innovations in Science". January, 28. 2013. Proceedings. Novosibirsk, 2013. P.156-161. ISBN 978-5-4379-0210-3. (in Russian).
  13. Alexey Konovalov, Igor Kotenko, Andrey Shorov. Simulation-based study of botnets and defense mechanisms against them. Journal of Computer and Systems Sciences International, ¹ 1, 2013, Š.45-68. ISSN 0002-3388. (in Russian).
  14. Olga Polubelova, Igor Kotenko. Design of ontologies for vulnerabilities and logical inference application for security information and event management. Security of Information Technologies, ¹1, 2013. P.21-24 (in Russian).
  15. Igor Kotenko, Igor Saenko. Architecture of the intelligent services system for information protection in critical infrastructures. Proceedings of SPIIRAS. Issue 1 (24). SPb: Nauka, 2013. P.21-40 (in Russian).
  16. Igor Kotenko, Igor Saenko. Scientific Analysis and Policy Support for Cyber Security: review of perspective studies on the results of the International Worksop SA&PS4CS 2012. Proceedings of SPIIRAS. Issue 1 (24). SPb: Nauka, 2013. P.66-88. (in Russian).
  17. Igor Kotenko, Igor Saenko, Olga Polubelova. Perspective storage systems for information security monitoring and management. Proceedings of SPIIRAS. Issue. 2 (25). SPb: Nauka, 2013. P.113-134. (in Russian).
  18. Igor Kotenko, Igor Saenko. Mathematical Methods, Models and Architectures for Computer Networks Security: a review of perspective studies on the results of the International Conference of MMM-ACNS-2012. Proceedings of SPIIRAS. Issue 2 (25). SPb: Nauka, 2013. P. 148-170 . (in Russian).
  19. Philipp Nesteruk, Igor Kotenko. Tools for creation of neural network components of intelligent information security systems. Proceedings of SPIIRAS. Issue 3 (26). St. Petersburg, Nauka, 2013. P.7-25. (in Russian).
  20. Elena Doynikova. Security metrics and security assessment techniques for the computer networks on the base of the attack graphs. Proceedings of SPIIRAS. Issue 3 (26). St. Petersburg, Nauka, 2013. P.54–68. (in Russian).
  21. Olga Polubelova. Architecture and software implementation for the system of filtration rules verification. Proceedings of SPIIRAS. Issue 3 (26). St. Petersburg, Nauka, 2013. P.79-90. (in Russian).
  22. Dmitry Komashinskiy. Detecting and identifying malicious executable binaries with data mining methods. Proceedings of SPIIRAS. Issue 3 (26). St.Petersburg, Nauka, 2013. P.115-125. (in Russian).
  23. Dmitry Komashinskiy. An approach to detect malicious documents based on data mining techniques. Proceedings of SPIIRAS. Issue 3 (26). St.Petersburg, Nauka, 2013. P.126-135. (in Russian).
  24. Vasily Desnitsky, Igor Kotenko. Configuring embedded information protection systems within services providing complex security on rail transport. Proceedings of SPIIRAS. Issue 7 (30). St.Petersburg, Nauka, 2013. P.40-55. (in Russian).
  25. Igor Kotenko, Igor Saenko, Andrey Chernov, Maria Butakova. The construction of a multi-level intelligent information security system for automated systems of railway transport. Proceedings of SPIIRAS.Issue 7 (30). SPb: Nauka, 2013. P.7-25. (in Russian).
  26. Vasily Desnitsky. A technique for verification of network information flows in information and telecommunication systems with embedded devices. Proceedings of SPIIRAS. Issue 7 (30). St.Petersburg, Nauka, 2013. P.246-257. (in Russian).
  27. Igor Kotenko, Evgenia Novikova. The Visual Analysis For Computer Network Security Assessment. Information and Control Systems, 2013, ¹ 3. P.55-61. (in Russian).
  28. Igor Kotenko, Igor Saenko. Perspective Methods and Models for Computer Networks Security and Security Support for Cyber Security: review of International Conference of MMM-ACNS-2012 and Workshop SA&PS4CS 2012. Management-information systems, 2013, ¹3, P.97-99. (in Russian).
  29. Vasily Desnitsky, Igor Kotenko. Configuration based design of security embedded devices. Problems of information security. Computer systems. ¹ 1, 2013, P.44-54. (in Russian).
  30. Olga Polubelova, Igor Kotenko. The verification technique of security policy filtration rules based on model checking. Problems of information security. Computer systems, ¹ 1, 2013. P.151-168. (in Russian).
  31. Evgenia Novikova, Igor Kotenko. The design of the visualisation subsystem of the SIEM-system// Information Technologies , ¹ 9, 2013.Moscow, New Technology. P.32-36. (in Russian).
  32. Igor Kotenko, Igor Saenko. International Conference "Mathematical Methods, Models and Architectures for Computer Networks Security" (MMM-ACNS-2012) and the International Workshop "Scientific Analysis and Policy Support for Cyber Security" (SA&PS4CS 2012). Information Security. Inside, 2013, ¹1. P.8-9 . (in Russian).
  33. Igor Kotenko, Igor Saenko. Intellectual services for information security in computer networks and systems. Information Security. Inside, 2013, ¹2. P.32-41. (in Russian).
  34. Igor Kotenko, Andrey Shorov. Infrastructure attack protection mechanisms based on bio-inspired approach "Network Nervous System". Issues of information Protection, ¹2, 2013. P.57-66. (in Russian).
  35. Igor Kotenko, Evgenia Novikova. Visualization Techniques for Security Information and Event Management. Issues of Information Protection, ¹ 3, 2013. Š.33-42. (in Russian).
  36. Dmitry Komashinskiy, Igor Kotenko Data mining methods for malware detection: review of state-of-the-art. Issues of information Protection, ¹4, 2013. P.21-33. (in Russian).
  37. Igor Kotenko, Igor Saenko. Proposals for the construction of a multi-level intelligent information security system for automated systems of railway transport. Herald of Rostov State Transport University, 2013, ¹3. P.69-79. ISSN 0201-727X. (in Russian).
  38. Igor Kotenko, Igor Saenko, Rafael Yusupov. Perspective models and methods for computer networks security. Herald of the Russian Academy of Sciences, Vol. 83, ¹5, 2013. P.84-85. (in Russian).
  39. Vasily Desnitsky, Igor Kotenko, Andrey Chechulin. Information flow verification for design of protected information systems with embedded devices. High availability systems, ¹ 3 (9), 2013. P.112-118. (in Russian).
  40. Sergey Ageev, Igor Saenko, Yury Egorov, Evgeny Zozulya. Adaptive algorithms of flow intensity estimation for multiservice networks. Proceedings of Automation and Control Processes. Issue 1 (31), 2013. P.3-11. (in Russian).
  41. Igor Kotenko, Andrey Shorov. Investigation of bioinspired approaches for protection against infrastructure attacks based on simulation framework. Technical science - from theory to practice, ¹17-1, 2013. Novosibirsk, SibAK, 2013. Š.39-43. (in Russian).
  42. Dmitry Kotenko, Igor Kotenko, Igor Saenko. Attacks modeling in large computer networks. Technical sciences - from theory to practice, ¹17-1, 2013. Novosibirsk: Publishing House «SibAK», 2013. P.12-16. (in Russian).
  43. Igor Kotenko, Igor Saenko. Intelligent Services System of information security for critical infrastructure. Technical sciences - from theory to practice, ¹17-1, 2013. Novosibirsk: Publishing House «SibAK», 2013. P.7-11 (in Russian).
  44. Igor Kotenko, Philipp Nesteruk, Andrey Shorov. A hybrid adaptive security system based on "nervous" and neural networks biometafors / / Innovations in science, ¹ 16-1, 2013. Novosibirsk:. "SibAK", 2013. P.79-83. (in Russian).
  45. Igor Kotenko, Saenko I.B., Doynikova E.V. Risk assessment for the computer networks of the critical infrastructures. Innovations in Science, ¹ 16-1, 2013 / "Innovations in Science": Proceedings of XVI International Theoretical and Practical Conference. Part I. (28 January 2013); Novosibirsk: Publisher "SibAK", 2013. P.84-88. ISBN 978-5-4379-0210-3. (in Russian).
  46. Vasily Desnitsky. Configuration based combined protection of embedded devices. Innovations in Science. ¹ 16-1, 2013. Novosibirsk: pub. "SibAK". P.64-67. (in Russian).
  47. Dmitry Komashinskiy. Characteristizing the use of data mining methods for malicious software detection. Innovations in Science, ¹16-1, 2013. Novosibirsk, SibAK, 2013. Š.74-78. (in Russian).
  48. Evgenia Novikova. Visual Models for Presentation of Information about Network Security. Innovations in Science, ¹ 16-1, 2013. Novosibirsk, SibAK, 2013. Š.116-120. (in Russian).
  49. Olga Polubelova. The verification technique of security policy filtering rules by model checking. Innovations in Science, ¹ 16-1, 2013. Novosibirsk, 2013. Š.134-138. (in Russian).
  50. Fadey Skorik, Igor Saenko. Neural network model for assessing the state of the distributed information system. Innovations in science, ¹6-1, 2013. Novosibirsk: Publishing House «SibAK», 2013. P.151-155 (in Russian).
  51. Anna Demyanchuk, Dmitri Moldovyan, Evgenia Novikova, Denis Gurianov. An Approach to Digital Sceme Construction Based on Two Difficult Problems. Information and Control Systems, ¹ 2, 2013. Š.60-66. (in Russian).
  52. Evgenia Novikova. Visualization of the Logs of the Mobile Money Transfer Services For Detecting Fraudster Activity. Proceedings ETU "LETI". 2013. ¹ 4. Š.44-48. (in Russian).
  53. Alexey Konovalov, Igor Kotenko, Andrey Shorov. Simulation-Based Study of Botnets and Defense Mechanisms against Them. Journal of Computer and Systems Sciences International, Vol.52, Issue 1, 2013. P.43-65. Pleiades Publishing, Ltd., ISSN 1064-2307. DOI: 10.1134/S1064230712060044.
  54. Dmitry Komashinskiy, Igor Kotenko. Intelligent Data Analysis for Malware Detection. International Journal of Computing, Research Institute of Intelligent Computer Systems, Ternopil National Economic University. 2013, Vol.12, Issue 1. P.63-74. ISSN 1727-6209.
  55. Igor Kotenko, Philipp Nesteruk, Andrey Shorov. Conception of a Hybrid Adaptive Protection of Information Systems. International Journal of Computing, Research Institute of Intelligent Computer Systems, Ternopil National Economic University. 2013, Vol.12, Issue 1. P.86-98. ISSN 1727-6209.
  56. Igor Kotenko, Elena Doynikova. Comprehensive Multilevel Security Risk Assessment of Distributed Information Systems. International Journal of Computing, Research Institute of Intelligent Computer Systems, Ternopil National Economic University. 2013, Vol.12, Issue 3. ISSN 1727-6209.
  57. Andrey Chechulin, Igor Kotenko. Construction of attack graphs for security events correlation. 15th Conference “RusCrypto” on Cryptology, Steganography, Digital Signature and Security Systems. Solnechnogorsk, Russia. March 28-30, 2013. http://www.ruscrypto.ru/ (in Russian).
  58. Igor Kotenko. Attack modeling, security analysis and visualisation in the SIEM-systems. 15th Conference “RusCrypto'2013”. Solnechnogorsk, Russia. March 28-30, 2013. http://www.ruscrypto.ru/ (in Russian).
  59. Vasily Desnitsky, Igor Kotenko, Andrey Chechulin. Design of secure information systems with embedded devices. 15th Conference “RusCrypto”. Solnechnogorsk, Russia. March 28-30, 2013. http://www.ruscrypto.ru/ (in Russian).
  60. Dmitry Komashinskiy, Andrey Chechulin, Igor Kotenko, Andrey Shorov. Categorization of web sites for inadmissible web pages blocking systems. 15th Conference “RusCrypto” on Cryptology, Steganography, Digital Signature and Security Systems. Solnechnogorsk, Russia. March 28-30, 2013. http://www.ruscrypto.ru/ (in Russian).
  61. Igor Kotenko Attack modeling, calculation of the security metrics and visualization in the perspective SIEM-systems. International forum on practical security “Positive Hack Days”. Moscow. May 23-24, 2013. http://www.phdays.ru (in Russian).
  62. Doynikova E.V, Igor Kotenko. Security assessment for the computer networks on the base of the attack graphs and multilevel system of the security metrics. 22th All-Russian Conference “Methods and technical tools of information security”(MTTIS 2013)”. Proceedings. St.Petersburg, Russia. July 08-11, 2013. P.18-20. (in Russian).
  63. Igor Kotenko, Igor Saenko, Elena Doynikova, Olga Polubelova. Application of the ontology of the security metrics for the decision support in cyber security. 22th All-Russian Conference “Methods and technical tools of information security”(MTTIS 2013)”. Proceedings. St.Petersburg, Russia. July 08-11, 2013. P.32-33. (in Russian).
  64. Andrey Shorov, Andrey Chechulin, Igor Kotenko. Categorization of web sites for inadmissible web pages blocking for decision support systems in cyber security. 22th All-Russian Conference “Methods and technical tools of information security”(MTTIS 2013)”. Proceedings. St.Petersburg, Russia. July 08-11, 2013. P.75-77. (in Russian).
  65. Vasily Desnitsky. Verification of information flows in process of development secure systems with embedded devices. 22th All-Russian Conference “Methods and technical tools of information security”(MTTIS 2013)”. Proceedings. St.Petersburg, Russia. July 08-11, 2013. P.17-18. (in Russian).
  66. Philipp Nesteruk. Development of an adaptive information security service. 22th All-Russian Conference “Methods and technical tools of information security”(MTTIS 2013)”. Proceedings. St.Petersburg, Russia. July 08-11, 2013. P.36-37. (in Russian).
  67. Evgenia Novikova. Visual analytics technique for analysis of events of the mobile money system// 22th All-Russian Conference “Methods and technical tools of information security”(MTTIS 2013)”. Proceedings. St.Petersburg, Russia. July 08-11, 2013. P.37-39. (in Russian).
  68. Olga Polubelova. Using ontologies in decision support system for selecting countermeasures. 22th All-Russian Conference “Methods and technical tools of information security”(MTTIS 2013)”. Proceedings. St.Petersburg, Russia. July 08-11, 2013. P.41-42 . (in Russian).
  69. Andrey Chechulin. Recognition of malefactors by attack tress analysis. 22th All-Russian Conference “Methods and technical tools of information security”(MTTIS 2013)”. Proceedings. St.Petersburg, Russia. July 08-11, 2013. P.141-142. (in Russian).
  70. Igor Saenko, Igor Kotenko, Olga Polubelova, Elena Doynikova. Application of the ontology of the security metrics for the selection of the countermeasures for the computer networks security. International congress IS&IT’13 - International Conference on Artificial Intelligence and Systems. Proceedings. Moskow, Fizmathlit, 2013. Vol.2. P.372-377. ISBN 978-5-9221-1479-0. (in Russian).
  71. Igor Saenko, Igor Kotenko, Ivan Morozov. Use of genetic algorithms for the access control in geographic information systems. International congress IS&IT’13 - International Conference on Artificial Intelligence and Systems.Proceedings. Moskow, Fizmathlit, 2013. Vol.2. P.58-63. ISBN 978-5-9221-1479-0 . (in Russian).
  72. Igor Kotenko, Igor Saenko. On construction a multi-level intelligent information security system for automated systems of railway transport. VIII Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2013)", Saint-Petersburg, October 23-25, 2013. The proceedings of conference, 2013. P.107-108 . (in Russian).
  73. Vasily Desnitsky, Igor Kotenko. Configuring embedded information protection systems within services of multi-level intelligent system of rail transport complex security. VIII Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2013)", Saint-Petersburg, October 23-25, 2013. The proceedings of conference, 2013. P.91-92. (in Russian).
  74. Igor Kotenko, Evgenia Novikova. An approach to design of the visual analytical system for security information management on Russian Railways. VIII Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2013)", Saint-Petersburg, October 23-25, 2013. The proceedings of conference, 2013. P.106-107. (in Russian).
  75. Igor Kotenko, Igor Saenko, Olga Polubelova, Elena Doynikova. Ontology of the security metrics for the computer network as basis for the selection of the countermeasures. VIII Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2013)", Saint-Petersburg, October 23-25, 2013. The proceedings of conference, 2013. P.108-109. (in Russian).
  76. Andrey Shorov, Andrey Chechulin, Igor Kotenko. Categorization of web sites for inadmissible web pages blocking systems by textual and graphical content analysis. VIII Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2013)", Saint-Petersburg, October 23-25, 2013. The proceedings of conference, 2013. P.129-130. (in Russian).
  77. Igor Kotenko. Intellectual information security services in security monitoring and management systems of critical infrastructures. VIII Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2013)", Saint-Petersburg, October 23-25, 2013. The proceedings of conference, 2013. (in Russian).
  78. Andrey Chechulin. Application of analytical attack modeling for security level increasing of distributed information systems. VIII Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2013)", Saint-Petersburg, October 23-25, 2013. The proceedings of conference, 2013. P.127-128. (in Russian).
  79. Vasily Desnitsky. Information flow verification in systems with embedded devices. VIII Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2013)", Saint-Petersburg, October 23-25, 2013. The proceedings of conference, 2013. P.92-93. (in Russian).
  80. Vasily Desnitsky. A technique for configuring secure embedded devices. VIII Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2013)", Saint-Petersburg, October 23-25, 2013. The proceedings of conference, 2013. P.93-94. (in Russian).
  81. Doynikova E.V. Approach to the security analysis for the distributed information systems on the base of the security metrics. VIII Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2013)", Saint-Petersburg, October 23-25, 2013. The proceedings of conference, 2013. P.94-95. (in Russian).
  82. Philipp Nesteruk. Trends in development of information security adaptive systems. VIII Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2013)", Saint-Petersburg, October 23-25, 2013. The proceedings of conference, 2013. P.117-118. (in Russian).
  83. Evgenia Novikova. Detection of the anomalous activity in mobile money system using visual analytics techniques. VIII Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2013)", Saint-Petersburg, October 23-25, 2013. The proceedings of conference, 2013. P.120. (in Russian).
  84. Olga Polubelova. The strategies of firewall filtration rule anomaly resolution.VIII Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2013)", Saint-Petersburg, October 23-25, 2013. The proceedings of conference, 2013. P.62-63. (in Russian).
  85. Igor Saenko, Valery Kuvayev. On intelligent system for access control to the resources of a common information space for different types of automated systems. VIII Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2013)", Saint-Petersburg, October 23-25, 2013. The proceedings of conference, 2013. P.105-106 . (in Russian).
  86. Valery Kuvayev, Igor Saenko. Access control to the resources of a common information space in the course of their integration in the automated systems for special purpose. 22th All-Russian Conference “Methods and technical tools of information security”(MTTIS 2013)”. Proceedings. St.Petersburg, Russia. July 08-11, 2013. P.85-86 . (in Russian).
  87. Sergey Ageev, Igor Saenko. Intelligent methods for security management in protected multi-service networks. 22th All-Russian Conference “Methods and technical tools of information security”(MTTIS 2013)”. Proceedings. St.Petersburg, Russia. July 08-11, 2013. P.51-52 . (in Russian).
  88. Fadey Skorik, Igor Saenko. The technology of "spread spectrum" to ensure the security of wireless networks. 22th All-Russian Conference “Methods and technical tools of information security”(MTTIS 2013)”. Proceedings. St.Petersburg, Russia. July 08-11, 2013. P.74-75 . (in Russian).
  89. Elena Doynikova. Development of the decision support system for the proactive response on the incidents of the information security. 18th St.Petersburg assembly of the young scientists and specialists. Proceedings.St.Petersburg, 2013. P.146. (in Russian).
  90. Evgenia Novikova , Jana Mondikova. Towards design of practical work "Blind digital signature" for "Criptographical Protocols" course. XIX International Scientific and Practical Conference "Modern education: content, technology, quality". Proceedings. St. Petersburg, Russia. April 24, 2013. P.135-136. (in Russian).
  91. Evgenia Novikova. The usage of interactive technologies in practical works for "Information system intrusion techniques and computer virology" course. XIX International Scientific and Practical Conference "Modern education: content, technology, quality". Proceedings. St. Petersburg, Russia. April 24, 2013. Ń.178-179. (in Russian).
  92. Anna Demjanchuk, Evgenia Novikova, Dmitrii Moldovyan. An approach for security level enforcement of the zero-knowledge authentication protocols. VIII Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2013)", Saint-Petersburg, October 23-25, 2013. The proceedings of conference, 2013. P.51-52. (in Russian).
  93. Igor Kotenko, Andrey Shorov, Evgenia Novikova. Simulation of Protection Mechanisms Based on "Network Nervous System" against Infrastructure Attacks. Proceedings of the 21th Euromicro International Conference on Parallel, Distributed and network-based Processing (PDP 2013). Belfast, Northern Ireland, UK. 27th February – 1st March 2013. Los Alamitos, California. IEEE Computer Society. 2013. P.526-533.
  94. Evgenia Novikova, Igor Kotenko. Analytical Visualization Techniques for Security Information and Event Management. Proceedings of the 21th Euromicro International Conference on Parallel, Distributed and network-based Processing (PDP 2013). Belfast, Northern Ireland, UK. 27th February – 1st March 2013. Los Alamitos, California. IEEE Computer Society. 2013. P.519-525.
  95. Igor Kotenko. Experiments with simulation of botnets and defense agent teams. 27th European Conference on Modelling and Simulation (ECMS 2013). Proceedings. May 27 - May 30st, Aalesund University College, Norway. 2013. P.61-67.
  96. Igor Kotenko, Evgenia Novikova. VisSecAnalyzer: a Visual Analytics Tool for Network Security Assessment. 3rd IFIP International Workshop on Security and Cognitive Informatics for Homeland Defense (SeCIHD 2013). In conjunction with the 8th International Conference on Availability, Reliability and Security (ARES 2013). September 2-6, 2013, Regensburg, Germany. Lecture Notes in Computer Science (LNCS), Vol.8128. Springer. 2013, P.345-360.

2012

  1. Jose Fran. Ruiz, Vasily Desnitsky, Rajesh Harjani, Antonio Manna, Igor Kotenko and Andrey Chechulin. A Methodology for the Analysis and Modeling of Security Threats and Attacks for Systems of Embedded Components. Proceeding of the 20th International Euromicro Conference on Parallel, Distributed and Network-based Processing (PDP 2012). Garching/Munich, February, 2012. P.261-268. (Scopus)
  2. Vasily Desnitsky, Igor Kotenko, Andrey Chechulin. Configuration-based approach to embedded device security. Lecture Notes in Computer Science, Springer-Verlag. The Sixth International Conference "Mathematical Methods, Models and Architectures for Computer Networks Security" (MMM-ACNS-2012). October 17-19, 2012, St. Petersburg, Russia. P.270-285. (Scopus)
  3. Andrey Chechulin, Igor Kotenko, Vasily Desnitsky. An Approach for Network Information Flow Analysis for Systems of Embedded Components. Lecture Notes in Computer Science, Springer-Verlag. The Sixth International Conference "Mathematical Methods, Models and Architectures for Computer Networks Security" (MMM-ACNS-2012). October 17-19, 2012, St. Petersburg, Russia. P.146-155. (Scopus)
  4. Igor Kotenko, Andrey Chechulin, Evgenia Novikova. Attack Modelling and Security Evaluation for Security Information and Event Management. SECRYPT 2012. International Conference on Security and Cryptography. Proceedings. Rome, Italy. 24–27 July 2012. P.391-394. (Scopus)
  5. Igor Kotenko, Andrey Chechulin. Common Framework for Attack Modeling and Security Evaluation in SIEM Systems. 2012 IEEE International Conference on Green Computing and Communications, Conference on Internet of Things, and Conference on Cyber, Physical and Social Computing. Besançon, France, September 11-14, 2012. Los Alamitos, California. IEEE Computer Society. 2012. P.94-101. (WoS, Scopus)
  6. Igor Kotenko, Andrey Chechulin. Attack Modeling and Security Evaluation in SIEM Systems. International Transactions on Systems Science and Applications, SIWN Press. Volume 8. December 2012. P.129-147, ISSN 1751-1461 (print) ISSN 2051-5642 (online) sai: itssa.0008.2012.041.
  7. Igor Kotenko, Andrey Chechulin and Elena Doynikova. Analytical Attack Modeling in Security Information and Event Management Systems. Proceedings of the Work in Progress Session held in connection with the 20th Euromicro International Conference on Parallel, Distributed and network-based Processing (PDP 2012). Garching/Munich, February 2012. SEA-Publications. SEA-SR-31. 2012. P.27-28.
  8. Vasily Desnitsky, Igor Kotenko, Andrey Chechulin. Configuration of secure systems with embedded and mobile devices. Issues of information Protection,¹2, 2012. P.20-28. (in Russian).
  9. Igor Kotenko, Philipp Nesteruk, Andrey Shorov. Protection Methods of Computer Network based on bioinspired approaches. Issues of information Protection, ¹2, 2012. P.35-46. (in Russian).
  10. Dmitry Komashinskiy, Igor Kotenko. Evaluation of structural peculiarities of harmful documents on the basis of Data Mining. Information Technologies and Computing Systems, ¹ 2, 2012, P.76-92. (in Russian).
  11. Dmitry Komashinskiy, Igor Kotenko. Detection of harmful PDF documents on the basis of intelligent data analysis. Problems of information security. Computer systems. ¹ 1, 2012, P.19-35. (in Russian).
  12. Igor Kotenko, Igor Saenko, Olga Polubelova, Andrey Chechulin. Methods for security event and information management for computer networks protection. Problems of information security. Computer systems. ¹ 3, 2012. P.57-68. (in Russian).
  13. Andrey Chechulin, Igor Kotenko, Vasily Desnitsky. Information flow analysis for development of secure systems with embedded devices. High availability systems, ¹ 2, 2012. P.116-122. (in Russian).
  14. Olga Polubelova, Igor Kotenko, Igor Saenko, Andrey Chechulin. Application of the ontological approaches and logical inference to security event and information management. High availability systems, ¹ 2, 2012. P.100-108. (in Russian).
  15. Evgenia Novikova, Igor Kotenko. Visualzation Techniques in SIEM-systems // High availability systems, ¹ 2, 2012. P.91-99. (in Russian).
  16. Vasily Desnitsky, Igor Kotenko, Andrey Chechulin. Configuring components of combined protection of embedded devices on the basis of solving optimality task. High availability systems, ¹ 2, 2012. P.50-56. (in Russian).
  17. Vasily Desnitsky, Igor Kotenko. A model for configuring protected and energy-efficient embedded systems. Journal of Instrument Engineering, Vol.55, ¹ 11, 2012. P.52–57. ISSN 0021-3454. (in Russian).
  18. Dmitry Komashinskiy, Igor Kotenko. An extraction method for structural features to detect harmful software. Journal of Instrument Engineering, Vol.55, ¹ 11, 2012. P.58-62. (in Russian).
  19. Igor Kotenko, Igor Saenko, Olga Polubelova, Andrey Chechulin. Application of the methods of security event and information management for information protection in the critical infrastructures. Proceedings of SPIIRAS. Issue 1 (20). St.Petersburg, Nauka, 2012. P.27-56. (in Russian).
  20. Igor Kotenko, Andrey Shorov. Simulation of the Protection Mechanisms against Infrastructural Attacks based on “Nervous Network System”. Proceedings of SPIIRAS. Issue 3 (22). St. Petersburg, Nauka, 2012. P.45–70. (in Russian).
  21. Igor Kotenko, Igor Saenko. Building a system of intelligent services for information security in cyber warfare. Proceedings of SPIIRAS. Issue 3 (22). St. Petersburg, Nauka, 2012. P.84-100. (in Russian).
  22. Olga Polubelova, Igor Kotenko. Verification of security policy filtering rules containing temporal parameters by Model Checking. Proceedings of SPIIRAS. Issue 3 (22). St. Petersburg, Nauka, 2012. P.113-138. (in Russian).
  23. Dmitry Kotenko, Igor Kotenko, Igor Saenko. Methods and tools for simulation of attacks in large computer networks: state of the problem. Proceedings of SPIIRAS. Issue 3 (22). St. Petersburg, Nauka, 2012. P.5-30. (in Russian).
  24. Dmitry Kotenko, Igor Kotenko, Igor Saenko. The method of iterative attacks modeling in large computer networks. Proceedings of SPIIRAS. Issue 4 (23). St. Petersburg, Nauka, 2012. P.50-79. (in Russian).
  25. Igor Kotenko, Philipp Nesteruk, Andrey Shorov. The concept of adaptive security of information technology systems based on paradigms of neural and nervous networks. Proceedings of SPIIRAS. Issue 4 (23). St. Petersburg, Nauka, 2012. P.100-115. (in Russian).
  26. Evgenia Novikova, Igor Kotenko. Visualization technologies for security information and event management. Proceedings SPIIRAS. Issue.4 (23)., Russia. 2012. P.7-29. (in Russian).
  27. Andrey Kii, Yan Kopchak, Igor Saenko, Andrey Kozlenko. Dynamic control of access to information resources in critical infrastructures based on the analysis of information of user profiles. Proceedings of SPIIRAS. Issue 2 (21). St. Petersburg, Nauka, 2012. P.5-20. (in Russian).
  28. Andrey Kozlenko, Vladimir Avramenko, Igor Saenko, Andrey Kii. The method of assessing the level of information protection from unauthorized access to computer networks based on graph protection. Proceedings of SPIIRAS. Issue 2 (21). St. Petersburg, Nauka, 2012. P.41-55. (in Russian).
  29. Alexandr Demidov, Oleg Nikiforov, Igor Saenko. Development of the concept of information security of information technology systems of state authorities. Proceedings of SPIIRAS. Issue 3 (22). St. Petersburg, Nauka, 2012. P.71-83. (in Russian).
  30. Evgenia Novikova. The Design of the New Course "Computer Virology and Intrusion Methods Detection" As Renovation of the Basis Course. Proceedings ETU «LETI». 2012. ¹ 4. P.44-48. (in Russian).
  31. Sergey Alishev, Igor Saenko, Vladimir Kudryashov, Evgeniy Oparin. Automation planning of convoys moving in emergency situations based on GIS technologies. Proceedings of Petersburg State Transport University, Issue 2 (31), 2012. P.99-105. (in Russian).
  32. Igor Saenko, Anton Nizhegorodov. Analysis of the problem of access control in automated systems based on database security assessment. Proceedings of Journal "In the world of scientific discoveries". Mathematics. Mechanics. Informatics. Issue 8(22), 2012. Krasnoyarsk. Publisher “Research and Innovation Center”. P.11-21. (in Russian).
  33. Sergey Ageev, Igor Saenko, Yuriy Egorov, Aleksandr Gladkih. To develop the set of mathematical models of secure multi-service network. Proceedings of Automation and Control Processes. Issue. No 3 (29), 2012. P.8-18. (in Russian).
  34. Igor Kotenko, Alexey Konovalov, Andrey Shorov. Investigative Simulation of Botnets and Defence Mechanisms against them. Appendix to the Information Technologies Journal. Moscow, New Technology, 2012, ¹1. 32 pages. ISSN 1684-6400. (in Russian).
  35. Igor Kotenko, Elena Doynikova. SCAP protocol overview. Information Security. Inside, ¹2, 2012. P.56-63. (in Russian).
  36. Igor Kotenko, Elena Doynikova, Andrey Chechulin. Total enumeration and classification of attack patterns (CAPEC): description and application examples. Information Security. Inside, ¹ 4, 2012. P.54-66. (in Russian).
  37. Igor Kotenko, Igor Saenko. SIEM-systems for security information and event management. Information Security. Inside, ¹5, 2012. P.2-12. (in Russian).
  38. Igor Kotenko, Igor Saenko, Rafael Yusupov. Intelligent security services as cybernetic counteraction tool . Scientific-Practical Proceedings on information counteraction problems, The Security Council of the Russian Federation. Moskow, 2012. (in Russian).
  39. Igor Kotenko, Alexey Konovalov, Andrey Shorov. Agent-based simulation of cooperative defense against botnets. Concurrency and Computation: Practice and Experience, Vol. 24, Issue 6, 2012. Š.573-588.
  40. Andrey Chechulin, Igor Kotenko. Analysis of real-time events in a network using the network attacks modeling. VII Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2011)", Saint-Petersburg, October 26-28. The proceedings of conference, 2012. P.93-98. (in Russian).
  41. Vasily Desnitsky. Configuration model for combined protection of information systems with embedded devices. VII Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2011)", Saint-Petersburg. The proceedings of conference, 2012. P.77-83. (in Russian).
  42. Igor Kotenko, Andrey Shorov, Philipp Nesteruk. The analysis of bio-inspired approaches to protect computer systems and networks. XVI All-Russian Scientific Conference «Neuroinformatics-2012». Proceedings.Issue 2. Moscow, MIPI, 2012. P.61-71. (in Russian).
  43. Igor Kotenko. Analytical attack modeling and event processing in security event and information management systems. 14th Conference “RusCrypto” on Cryptology, Steganography, Digital Signature and Security Systems. Solnechnogorsk, Russia. March 28-30, 2012. http://www.ruscrypto.ru/ (in Russian).
  44. Jose Fran. Ruiz, Vasily Desnitsky. Design of protected telecommunication systems with embedded devices. 14th Conference “RusCrypto'2012”. Solnechnogorsk, Russia. March 28-30, 2012. http://www.ruscrypto.ru/ (in Russian).
  45. Colin Fidge, Andrey Chechulin. Information flow analysis for development of secure systems with embedded devices. 14th Conference “RusCrypto” on Cryptology, Steganography, Digital Signature and Security Systems. Solnechnogorsk, Russia. March 28-30, 2012. http://www.ruscrypto.ru/ (in Russian).
  46. Olga Polubelova. Application of the ontological approaches and logical inferences to security event and information management. 14th Conference “RusCrypto” on Cryptology, Steganography, Digital Signature and Security Systems. Solnechnogorsk, Russia. March 28-30, 2012. http://www.ruscrypto.ru/ (in Russian).
  47. Evgenia Novikova. Visualisation Mechanisms in SIEM-systems. 14th Conference “RusCrypto” on Cryptology, Steganography, Digital Signature and Security Systems. Solnechnogorsk, Russia. March 28-30, 2012 http://www.ruscrypto.ru/ (in Russian).
  48. Igor Kotenko. Cyberwars of software agents: application of the intelligent agent teamwork theory for cyber army building. International forum on practical security “Positive Hack Days”. Moscow. May 30-31, 2012. http://www.phdays.ru (in Russian).
  49. Vasily Desnitsky, Igor Kotenko. Configuring information and telecommunication systems with embedded devices. 21th All-Russian Conference “Methods and technical tools of information security”(MTTIS 2012). Proceedings. St.Petersburg, Russia. June 24-29, 2012.P.14-17. (in Russian).
  50. Elena Doynikova, Dmitry Kotenko, Igor Kotenko. Analysis of the intrusions using attack and service dependency graphs. 21th All-Russian Conference "Methods and technical tools of information security" (MTTIS 2012). Proceedings. St.Petersburg, Russia. June 24-29, 2012. P.45-47. (in Russian).
  51. Igor Kotenko, Andrey Chechulin. Analytical attack modeling in security event and information management systems. 21th All-Russian Conference "Methods and technical tools of information security" (MTTIS 2012). Proceedings. St.Petersburg, Russia. June 24-29, 2012. P.57-58. (in Russian).
  52. Philipp Nesteruk, Igor Kotenko. Formation of fuzzy knowledge base for adaptive information protection systems. 21th All-Russian Conference "Methods and technical tools of information security" (MTTIS 2012). Proceedings. St.Petersburg, Russia. June 24-29, 2012. P.64-65. (in Russian).
  53. Igor Saenko, Igor Kotenko, Olga Polubelova. The use of an ontological approach to construct a vulnerabilities’ model based on the SCAP. 21th All-Russian Conference "Methods and technical tools of information security" (MTTIS 2012). Proceedings. St.Petersburg, Russia. June 24-29, 2012. P.74-76. (in Russian).
  54. Andrey Chechulin, Vasily Desnitsky, Igor Kotenko. Information flow analysis for development of secure systems with embedded devices. 21th All-Russian Conference "Methods and technical tools of information security" (MTTIS 2012). Proceedings. St.Petersburg, Russia. June 24-29, 2012. P.35-37. (in Russian).
  55. Vasily Desnitsky, Andrey Chechulin. Analysis of incompatibilities between security components in design process of secure embedded devices. 21th All-Russian Conference "Methods and technical tools of information security" (MTTIS 2012). Proceedings. St.Petersburg, Russia. June 24-29, 2012. P.17-19. (in Russian).
  56. Vasily Desnitsky. Modeling of non-functional protection properties in the process of configuration of secure embedded devices. 21th Ąll-Russian Conference "Methods and technical tools of information security" (MTTIS 2012). Proceedings. St.Petersburg, Russia. June 24-29, 2012. P.12-14. (in Russian).
  57. Dmitry Komashinskiy. Detection systems based on Data Mining and their precision heightening methods. 21th All-Russian Conference "Methods and technical tools of information security" (MTTIS 2012). Proceedings. St.Petersburg, Russia. June 24-29, 2012. P.159-160. (in Russian).
  58. Evgenia Novikova. Attack graph visualization techniques. 21th All-Russian Conference "Methods and technical tools of information security" (MTTIS 2012). Proceedings. St.Petersburg, Russia. June 24-29, 2012. P.69-70. (in Russian).
  59. Andrey Chechulin. Technique for evaluation of the efficiency of combined protection against network scanning. 21th All-Russian Conference "Methods and technical tools of information security" (MTTIS 2012). Proceedings. St.Petersburg, Russia. June 24-29, 2012. P.79-81. (in Russian).
  60. Andrey Shorov. Protection against Attacks on Computer Networks Infrastructure based on “Nervous Network System” Approach. 21th All-Russian Conference "Methods and technical tools of information security" (MTTIS 2012). Proceedings. St.Petersburg, Russia. June 24-29, 2012. P.81-82. (in Russian).
  61. Sergey Ageev, Igor Saenko. On the models of the coordination of protected multiservice networks management. 21th All-Russian Conference "Methods and technical tools of information security" (MTTIS 2012). Proceedings. St.Petersburg, Russia. June 24-29, 2012. P.39-40. (in Russian).
  62. Anton Nizhegorodov, Igor Saenko. The management of information and telecommunications system security in creating a unified system of access control to information resources. 21th All-Russian Conference "Methods and technical tools of information security" (MTTIS 2012). Proceedings. St.Petersburg, Russia. June 24-29, 2012. P.65-67. (in Russian).
  63. Igor Kotenko, Andrey Chechulin. Analytical attack modeling for security event and information management. International congress IS&IT - International Conference on Artificial Intelligence and Systems. Proceedings. Divnomorskoye, Black Sea Coast, Russia. September 2-9. Moskow, Fizmathlit, 2012. Vol.1. P.385-391. (in Russian).
  64. Igor Kotenko, Igor Saenko. The use of genetic algorithms in optimization problems of the information access control. International congress IS&IT - International Conference on Artificial Intelligence and Systems. Proceedings. Divnomorskoye, Black Sea Coast, Russia. September 2-9. Moskow, Fizmathlit, 2012. Vol.1. P.40-45. (in Russian).
  65. Olga Polubelova, Igor Kotenko, Igor Saenko. Ontological approach to the construction of intelligent services for security event storage and processing. International congress IS&IT - International Conference on Artificial Intelligence and Systems. Proceedings. Divnomorskoye, Black Sea Coast, Russia. September 2-9. Moskow, Fizmathlit, 2012. Vol. 2. P.394-399. (in Russian).
  66. Vasily Desnitsky. Configuring combined protection components for embedded system protection on the base of solving optimality task. International congress IS&IT - International Conference on Artificial Intelligence and Systems. Proceedings. Divnomorskoye, Black Sea Coast, Russia. September 2-9. Moskow, Fizmathlit, 2012. Vol. 2. P.383-384. (in Russian).
  67. Igor Kotenko, Rafael Yusupov. Cybersecurity: current state and development trends. The St.Petersburg Scientific Forum “Science and Society. Information technologies”. Seventh St.Petersburg Meeting of the Nobel Prize laureates. Proceedings. St.Petersburg. 2012. P.55-56. (in Russian).
  68. Andrey Shorov, Igor Kotenko. The Bioinspired Approaches to Protect Computer Networks from Infrastructure Attacks. St. Petersburg Scientific Forum "Science and Society". "Science and Mankind Progress". VII St. Petersburg Nobel Prize Laureates Meeting. Proceedings. St.Petersburg. P.149-150. (in Russian).
  69. Evgenia Novikova, Chechulin A.A., Igor Kotenko. Visualisation techniques for computer attack counteraction in security information and event management systems. St. Petersburg Scientific Forum "Science and Society". "Science and Mankind Progress". VII St.Petersburg Nobel Prize Laureates Meeting. Proceedings. St.Petersburg, Russia. P.151-152. (in Russian).
  70. Igor Kotenko, Rafael Yusupov. Current state and development trends in the field of construction of secure computer systems. 5th Russian Multiconference on Problems in Control (MPC). Conference on Information Technologies in Control (ITC).Proceedings. St.Petersburg, Russia. October 9–11, 2012. P.671-675. (in Russian).
  71. Vasily Desnitsky, Igor Kotenko, Andrey Chechulin. Design of secure embedded systems in European Union project SecFutur. 5th Russian Multiconference on Problems in Control (MPC). Conference on Information Technologies in Control (ITC).Proceedings. St.Petersburg, Russia. October 9–11, 2012. P.699-708. (in Russian).
  72. Andrey Chechulin, Igor Kotenko, Evgenia Novikova, Elena Doynikova. Attacks and protection mechanisms in the security event and information management. 5th Russian Multiconference on Problems in Control (MPC). Conference on Information Technologies in Control (ITC).Proceedings. St.Petersburg, Russia. October 9–11, 2012. P.735-739. (in Russian).
  73. Olga Polubelova, Igor Kotenko, Igor Saenko. Methods of data representation and inference for security information and events management. 5th Russian Multiconference on Problems in Control (MPC). Conference on Information Technologies in Control (ITC).Proceedings. St.Petersburg, Russia. October 9–11, 2012. P.723-728. (in Russian).
  74. Sergey Ageev, Igor Saenko, Evgeniy Zozulja. Methods of interlayer criteria coordination for the operation of a protected multi-service network. XIII Saint-Petersburg International Conference “Regional informatics-2012” (“RI-2012”). Proceedings. St. Petersburg, 2012. P.77. (in Russian).
  75. Vasily Desnitsky. Analysis of approaches to development of anytime algorithms to solve computationally complex problems. XIII Saint-Petersburg International Conference “Regional informatics-2012” (“RI-2012”). Proceedings. St. Petersburg, 2012. P.90. (in Russian).
  76. Vasily Desnitsky. Configuring secure embedded devices on the base of non-functional protection properties. XIII Saint-Petersburg International Conference “Regional informatics-2012” (“RI-2012”). Proceedings. St. Petersburg, 2012. P.91. (in Russian).
  77. Vasily Desnitsky, Andrey Chechulin. Analysis of incompatibilities of security components in embedded devices. XIII Saint-Petersburg International Conference “Regional informatics-2012” (“RI-2012”). Proceedings. St. Petersburg, 2012. P.93. (in Russian).
  78. Vasily Desnitsky, Andrey Chechulin, Igor Kotenko. Using anytime algorithms of attack modeling and security evaluation in SIEM systems. XIII Saint-Petersburg International Conference “Regional informatics-2012” (“RI-2012”). Proceedings. St. Petersburg, 2012. P. 92. (in Russian).
  79. Elena Doynikova, Igor Kotenko. Integrated approach for security metric set constructing for risk assessment and reaction to intrusions. XIII Saint-Petersburg International Conference “Regional informatics-2012” (“RI-2012”). Proceedings. St. Petersburg, 2012. P.94. (in Russian).
  80. Igor Kotenko, Philipp Nesteruk. On the development of an adaptive information protection system for computer networks. XIII Saint-Petersburg International Conference “Regional informatics-2012” (“RI-2012”). Proceedings. St. Petersburg, 2012. P.102. (in Russian).
  81. Dmitry Krutov, Igor Saenko. Information approach to the implementation of a multi-agent system for information security. XIII Saint-Petersburg International Conference “Regional informatics-2012” (“RI-2012”). Proceedings. St. Petersburg, 2012. P.103. (in Russian).
  82. Ivan Morozov, Igor Saenko. Information Access control in geographic information systems. XIII Saint-Petersburg International Conference “Regional informatics-2012” (“RI-2012”). Proceedings. St.Petersburg, 2012. P.111. (in Russian).
  83. Philipp Nesteruk. Technique of adaptive information protection system development. XIII Saint-Petersburg International Conference “Regional informatics-2012” (“RI-2012”). Proceedings. St.Petersburg, 2012. P.113. (in Russian).
  84. Philipp Nesteruk. Of important tasks that provide adaptive security of IT systems. XIII Saint-Petersburg International Conference “Regional informatics-2012” (“RI-2012”). Proceedings. St.Petersburg, 2012. P.112. (in Russian).
  85. Anton Nizhegorodov, Igor Saenko. On the establishment of systems for the protection of cloud-based information systems. XIII Saint-Petersburg International Conference “Regional informatics-2012” (“RI-2012”). Proceedings. St. Petersburg, 2012. P.114. (in Russian).
  86. Evgenia Novikova. Techniques of the visual analysis for computer network security assessment. XIII Saint-Petersburg International Conference “Regional informatics-2012” (“RI-2012”). Proceedings. St.Petersburg, 2012. P.114. (in Russian).
  87. Evgenia Novikova. Design of the visualization component for security event and information management. XIII Saint-Petersburg International Conference “Regional informatics-2012” (“RI-2012”). Proceedings. St. Petersburg, 2012. Š.115 (in Russian).
  88. Olga Polubelova. Applying of linear temporal logic to verification of security policy filtering rules by model checking. XIII Saint-Petersburg International Conference “Regional informatics-2012” (“RI-2012”). Proceedings. St. Petersburg, 2012. P.121. (in Russian).
  89. Andrey Chechulin, Igor Kotenko. Attack graph building based on malefactor models and information on vulnerabilities and attack patterns. XIII Saint-Petersburg International Conference “Regional informatics-2012” (“RI-2012”). Proceedings. St. Petersburg, 2012. P.129-130. (in Russian).
  90. Andrey Chechulin. Malefactor goals recognition based on analysis of security events and attack graphs. XIII Saint-Petersburg International Conference “Regional informatics-2012” (“RI-2012”). Proceedings. St. Petersburg, 2012. P.130. (in Russian).
  91. Andrey Chechulin, Vasily Desnitsky. Information flow analysis in the task of embedded system analysis. XIII Saint-Petersburg International Conference “Regional informatics-2012” (“RI-2012”). Proceedings. St. Petersburg, 2012. P.129. (in Russian).
  92. Andrey Shorov. The Bioinspired Approach of “Nervous Network System” for the Protection of Computer Networks against Infrastructure Attacks. XIII Saint-Petersburg International Conference “Regional informatics-2012” (“RI-2012”). Proceedings. St. Petersburg, 2012. P.132. (in Russian).
  93. Igor Saenko, Anton Nizhegorodov, Aleksey Kabanov. Concerning the need of a unified system for access control to information resources in automated systems. International Scientific-Practical Conference "Modern trends of theoretical and applied research '2012». Collection of scientific papers of SWorld. Proceedings Issue 1. Vol.4. Odessa: KUPRIENKO, 2012. CIT: 112-628. P.28-30. (in Russian).
  94. Igor Saenko, Anton Nizhegorodov. The impact of protection of information resources in an integrated critical infrastructure security. IV All-Russian Scientific-Practical Conference "Security in an emergency". St. Petersburg, Collection of scientific papers , Polytechnical University Publishing House, 2012. P.151-154. (in Russian).
  95. Dmitry Moldovyan, Evgenia Novikova, Alexey Rizhkov, I. Vasiliev. The collective digital signature with message recovery. 65 conference of the teaching stuff of the St. Petersburg State Electrotechnical University, Proceedings. St. Petersburg. Russia. January 24 - February 4, 2012. P.115-119. (in Russian).
  96. Anna Demyanchuk, Dmitry Moldovyan, Evgenia Novikova. Zero knowledge protocols of "request-response" type. All-Army Scientific Conference" Innovations in the Armed Forces of the Russian Federation". Proceedings. St.Petersburg, Russia. November 29-30, 2012. P.144-148. (in Russian).
  97. Evgenia Novikova. Visual models for computer network security analysis. XVII St.Petersburg assembly of young scientists and specialists. Proceedings. October 12, 2012. P.196. (in Russian).
  98. Philipp Nesteruk. Research and development of perspective means of intelligent information protection for industrial systems of the city management. XVII St.Petersburg assembly of young scientists and specialists. Proceedings. October 12, 2012 St. Petersburg., 2012. P.195-196. (in Russian).
  99. Andrey Chechulin. Development of an advanced intrusion detection system. XVII St. Petersburg assembly of young scientists and specialists. Proceedings. October 12, 2012. P.196. (in Russian).
  100. Evgenia Novikova. Education technologies for teaching network intrusion detection providing adaptive mobility of the specialists in computer security. XVIII International Scientific and Practical Conference "Modern education: content, technology, quality". Proceedings. St. Petersburg, Russia. April 18, 2012, Ņ.1. P.221-222. (in Russian).
  101. Tatyana Nesteruk, Lesya Nesteruk, Philipp Nesteruk. Modern trends of knowledge management. Scientific and Practical Conference "Information aspects of economy". Proceedings. Editorial Board.: M.Y.Chirkov. SPb.: SPbGIEU, 2012. P.152-158. (in Russian).
  102. Vasily Desnitsky. Development of model and software tool for configuring and security control in corporative distributed information systems with embedded and mobile devices. XVII St. Petersburg assembly of young scientists and specialists. Proceedings. October 12, 2012. P.195. (in Russian).
  103. Igor Saenko, Igor Kotenko. Design and Performance Evaluation of Improved Genetic Algorithm for Role Mining Problem. Proceeding of the 20th International Euromicro Conference on Parallel, Distributed and Network-based Processing (PDP 2012). Garching/Munich, February, 2012. P.269-274.
  104. Igor Kotenko, Olga Polubelova, Igor Saenko. Hybrid Data Repository Development and Implementation for Security Information and Event Management. Proceedings of the Work in Progress Session held in connection with the 20th Euromicro International Conference on Parallel, Distributed and network-based Processing (PDP 2012). Garching/Munich, February 2012. SEA-Publications. SEA-SR-31. 2012. P.29-30.
  105. D. Komashinskiy and Igor Kotenko. Using Low-Level Dynamic Attributes for Malware Detection based on Data Mining Methods. Lecture Notes in Computer Science, Springer-Verlag, Vol. 7531. The Sixth International Conference "Mathematical Methods, Models and Architectures for Computer Networks Security" (MMM-ACNS-2012). October 17-19, 2012, St. Petersburg, Russia. P.254-269.
  106. Alexandr Moldovyan, Nikolay Moldovyan, Evgenia Novikova. Blind 384-bit Digital Signature Scheme. Lecture Notes in Computer Science, Springer-Verlag, Vol. 7531. The Sixth International Conference "Mathematical Methods, Models and Architectures for Computer Networks Security" (MMM-ACNS-2012). October 17-19, 2012, St. Petersburg, Russia. P.77-83.
  107. Igor Kotenko. Cyber Wars of Intelligent Agents in the Internet. The Second International Workshop “Scientific Analysis and Policy Support for Cyber Security” (SA&PS4CS 2012). St. Petersburg, Russia, October 20, 2012. P.10.
  108. Igor Kotenko, Olga Polubelova, Igor Saenko. Data Repository for Security Information and Event Management in service infrastructures. Proceedings of 9th International Joint Conference on e-Business and Telecommunications (ICETE 2012). International Conference on Security and Cryptography (SECRYPT 2012). Rome, Italy, 24–27 July, 2012. P.308-313.
  109. Igor Kotenko, Andrey Shorov. Simulation of Protection Mechanisms against Botnets on The Basis of “Nervous Network” Framework. Proceedings of the 2nd International Conference on Simulation and Modeling Methodologies, Technologies and Applications (SIMULTECH 2012), SciTePress, 2012. P.164-169.
  110. Igor Kotenko, Olga Polubelova, Igor Saenko. The Ontological Approach for SIEM Data Repository Implementation. 2012 IEEE International Conference on Green Computing and Communications, Conference on Internet of Things, and Conference on Cyber, Physical and Social Computing. Besançon, France, September 11-14, 2012. Los Alamitos, California. IEEE Computer Society. 2012. P.761-766.

2011

  1. Igor Kotenko, Alexey Konovalov, Andrey Shorov. Agent-based simulation of cooperative defence against botnets. Concurrency and Computation: Practice Experience. John Wiley Sons, 2011. Published online in Wiley Online Library (wileyonlinelibrary.com). DOI: 10.1002/cpe.1858.
  2. Igor Kotenko, Mikhail Stepashkin, Elena Doynikova. Security analysis of information systems taking into account social engineering attacks. Proceedings of the 19th Euromicro International Conference on Parallel, Distributed and network-based Processing (PDP 2011). Ayia Napa, Cyprus, 9-11 February, 2011. Los Alamitos, California. IEEE Computer Society. 2011. P.611-618. ISSN 1066-6192. (Scopus)
  3. Igor Saenko, Igor Kotenko. Genetic Algorithms for Role Mining Problem. Proceedings of the 19th Euromicro International Conference on Parallel, Distributed and network-based Processing (PDP 2011). Ayia Napa, Cyprus, 9-11 February, 2011. Los Alamitos, California. IEEE Computer Society. 2011. P.646-650. ISSN 1066-6192.
  4. Vasily Desnitsky, Igor Kotenko, Andrey Chechulin. An abstract model for embedded systems and intruders. Proceedings of the Work in Progress Session held in connection with the 19th Euromicro International Conference on Parallel, Distributed and network-based Processing (PDP 2011). Ayia Napa, Cyprus, February 2011. SEA-Publications. SEA-SR-29. 2011. P.25-26. ISBN 978-3-902457-29-5.
  5. Igor Kotenko. Cyber Security: Current State and Future Landscape. View from Russia. The Interface of Science, Technology & Security: Areas of most Concern, Now and Ahead. APCSS SEMINAR Proceedings, Honolulu, Hawaii, 4-8 October 2010. Asia-Pacific Center for Security Studies. USA. 2011.
  6. Igor Kotenko, Olga Polubelova. Verification of Security Policy Filtering Rules by Model Checking. Proceedings of IEEE Fourth International Workshop on "Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications" (IDAACS'2011). Prague, Czech Republic, 15-17 September 2011. P.706-710. ISBN 978-1-4244-4882-1.
  7. Igor Kotenko, Alexey Konovalov, Andrey Shorov. Simulation of botnets and protection mechanisms against them: software environment and experiments. 16th Nordic Conference on Secure IT-Systems. October 26th-28th, 2011. Tallinn, Estonia, Preproceedings, Cybernetica, 2011. P.119-126.
  8. Igor Kotenko, Andrey Chechulin, Elena Doynikova. Combining of Scanning Protection Mechanisms in GIS and Corporate Information Systems. Information Fusion and Geographic Information Systems. Proceedings of the 5th International Workshop on Information Fusion and Geographical Information Systems: Towards the Digital Ocean (IF&GIS 2011). Brest, France, May 10-11, 2011. Brest, France, 2011. Lecture Notes in Geoinformation and Cartography. Springer. 2011. P.45-58. ISSN 1863-2246. (Scopus)
  9. Igor Kotenko, Igor Saenko, Rafael Yusupov. Protection of Information Resources in Computer Networks. Herald of the Russian Academy of Sciences, Vol.81, ¹8, 2011. P.746-747. ISSN 1019:3316. (in Russian).
  10. Igor Kotenko, Igor Saenko, Rafael Yusupov. Scientific Analysis and Policy Support for Security in Cyberspace. Herald of the Russian Academy of Sciences, Vol.81, ¹9, 2011. P.844-845. ISSN 1019:3316. (in Russian).
  11. Igor Kotenko, Philipp Nesteruk, Andrey Chechulin. Combining of scanning detection mechanisms in computer networks. Information security problems, ¹ 3, 2011. P.30-34. (in Russian).
  12. Igor Kotenko, Alexey Konovalov, Andrey Shorov Agent-oriented simulation of botnets and defense against them. Protection issues of information, ¹ 3, 2011. P.24-29. (in Russian).
  13. Vasily Desnitsky, Andrey Chechulin. Model of the process for secure embedded systems development. High availability systems, ¹ 2, 2011. P.97-101. (in Russian).
  14. Dmitry Komashinkiy, Igor Kotenko, Andrey Chechulin. Categorization of web sites for inadmissible web pages blocking. High availability systems, ¹ 2, 2011. P.102-106. (in Russian).
  15. Igor Kotenko, Alexey Konovalov, Andrey Shorov. Simulation of Botnets and Defence Mechanisms against them. High availability systems, ¹ 2, 2011. P.107-111. (in Russian).
  16. Igor Saenko, Igor Kotenko. Genetic optimization of role-based access schemes. High availability systems, No.2, 2011. P.112-116. (in Russian).
  17. Igor Kotenko, Mikhail Stepashkin, Elena Doynikova. Security Analysis of Computer-aided Systems taking into account Social Engineering Attacks. Problems of information security. Computer systems. 2011, ¹ 3. P.40-57. (in Russian).
  18. Igor Kotenko, Mikhail Stepashkin, Dmitry Kotenko, Elena Doynikova. Information systems security evaluation on the base of social engineering attacks trees. Journal of Instrument Engineering , Ņ.54, ¹ 12, 2011. P.5-9. ISSN 0021-3454. (in Russian).
  19. Igor Kotenko, Andrey Shorov. The use of biological metaphors to protect computer systems and networks: a preliminary analysis of the basic approaches. Information Security. Inside, 2011. ¹ 1, P.52-57. ¹ 2, P.66-75. (in Russian).
  20. Igor Kotenko, Vasily Desnitsky, Andrey Chechulin. Investigation of technologies for secure embedded systems design in European Union project SecFutur. Information Security. Inside, ¹ 3, 2011. P.68-75. (in Russian).
  21. Igor Kotenko, Elena Doynikova. Vulnerabilities assessment techniques: use for the computer systems security analysis. Information Security. Inside, ¹ 4, 2011. P.74-81. (in Russian).
  22. Igor Kotenko, Elena Doynikova. Vulnerabilities Scoring System CVSS and its application for the computer systems security analysis. Information Security. Inside, ¹ 5, 2011. P.54-60. (in Russian).
  23. Igor Kotenko, Elena Doynikova. Misuse and configuration scoring systems (CMSS and CCSS) for the unified computer systems security analysis. Information Security. Inside, ¹ 6, 2011. P.52-60. (in Russian).
  24. Yury Sineshchuk, Aleksander Philippov, Sergey Terehin, Denis Nikolaev, Igor Saenko. Structural-logical method of the safety analysis of the potential dangerous objects. Proceedings of SPIIRAS. Issue 2 (17). St.Petersburg, Nauka, 2011. P.55-69. (in Russian).
  25. Igor Kotenko, Andrey Shorov, Philipp Nesteruk. The analysis of bioinspired approaches to protect computer systems and networks. Proceedings of SPIIRAS. Issue 3 (18). St.Petersburg, Nauka, 2011. P.19-73. (in Russian).
  26. Igor Kotenko, Alexey Konovalov, Andrey Shorov. Simulation of Botnets and Defence Mechanisms against them: simulation environment and experiments. Proceedings of SPIIRAS. Issue 4 (19). St.Petersburg, Nauka, 2011. (in Russian).
  27. Vasily Desnitsky. Configuring embedded and mobile devices based on optimality problem solving. Proceedings of SPIIRAS. Issue 4 (19). St.Petersburg, Nauka, 2011. (in Russian).
  28. Vasily Desnitsky, Igor Kotenko, Andrey Chechulin. Constructing and testing secure embedded systems. XII Saint-Petersburg International Conference “Regional informatics-2010” (“RI-2010”). Selected Proceedings. St. Petersburg, 2011. P.115-121. (in Russian).
  29. Igor Kotenko, Alexey Konovalov, Andrey Shorov. Simulation of defense against botnets in the Internet. XII Saint-Petersburg International Conference “Regional informatics-2010” (“RI-2010”). Selected Proceedings. St. Petersburg, 2011. P.121-132. (in Russian).
  30. Andrey Chechulin, Igor Kotenko. Combining of scanning detection mechanisms. The Ninth All-Russian Scientific Conference "Mathematics and Security of Information Technologies" (MSIT-10). Moscow, 2011. (in Russian).
  31. Vasily Desnitsky, Igor Kotenko, Andrey Chechulin. Abstract model for embedded secure systems. The Nineth All-Russian Scientific Conference "Mathematics and Security of Information Technologies" (MSIT-10). Moscow, 2011. (in Russian).
  32. Alexey Konovalov, Igor Kotenko, Andrey Shorov. The experiments for exploring of botnets. The Nineth All-Russian Scientific Conference "Mathematics and Security of Information Technologies" (MSIT-10). Moscow, 2011. (in Russian).
  33. Andrey Chechulin, Vasily Desnitsky. Intruder model for provision of embedded systems security. The Nineth All-Russian Scientific Conference "Mathematics and Security of Information Technologies" (MSIT-10). Moscow, 2011. (in Russian).
  34. Igor Kotenko. Modeling and analysis of the cybersecurity mechanisms. 13th Conference “RusCrypto” on Cryptology, Steganography, Digital Signature and Security Systems. Solnechnogorsk, Russia. March 30 - April 2, 2011. http://www.ruscrypto.ru/ (in Russian).
  35. Igor Saenko, Igor Kotenko. Method of genetic optimization of schemes for role-based access to information. 13th Conference “RusCrypto” on Cryptology, Steganography, Digital Signature and Security Systems. Solnechnogorsk, Russia. March 30 - April 2, 2011. http://www.ruscrypto.ru/ (in Russian).
  36. Dmitry Komashinkiy, Andrey Chechulin, Igor Kotenko. Categorization of web pages with inadmissible content. 13th Conference “RusCrypto” on Cryptology, Steganography, Digital Signature and Security Systems. Solnechnogorsk, Russia. March 30 - April 2, 2011. http://www.ruscrypto.ru/ (in Russian).
  37. Alexey Konovalov, Andrey Shorov. Simulation of counteraction of botnets and defense mechanisms. 13th Conference “RusCrypto” on Cryptology, Steganography, Digital Signature and Security Systems. Solnechnogorsk, Russia. March 30 - April 2, 2011. http://www.ruscrypto.ru/ (in Russian).
  38. Vasily Desnitsky, Andrey Chechulin. Unification of a process of secure embedded systems construction. 13th Conference “RusCrypto” on Cryptology, Steganography, Digital Signature and Security Systems. Solnechnogorsk, Russia. March 30 - April 2, 2011. http://www.ruscrypto.ru/ (in Russian).
  39. Elena Doynikova, Igor Kotenko. Extension of the informasion risks assessment techniques via application of the service dependency graphs. 20th All-Russian Conference “Methods and technical tools of information security” (MTTIS 2011)”. Proceedings. St.Petersburg, Russia. June 27 - July 01, 2011. P.131-132. (in Russian).
  40. Elena Doynikova, Dmitry Kotenko. Application of the vulnerabilities scoring systems to the computer systems security analysis. Tools for security analysis of automated systems. 20th All-Russian Conference “Methods and technical tools of information security” (MTTIS 2011)”. Proceedings. St.Petersburg, Russia. June 27 - July 01, 2011. P.130-131. (in Russian).
  41. Igor Kotenko, Philipp Nesteruk. The principles of an adaptive security systems creation. Tools for security analysis of automated systems. 20th All-Russian Conference “Methods and technical tools of information security” (MTTIS 2011)”. Proceedings. St.Petersburg, Russia. June 27 - July 01, 2011. P.32-33. (in Russian).
  42. Igor Saenko, Olga Polubelova, Igor Kotenko. Design of SIEM repository for a heterogeneous infrastructure. 20th All-Russian Conference “Methods and technical tools of information security” (MTTIS 2011)”. Proceedings. St.Petersburg, Russia. June 27 - July 01, 2011. Š.41-42. (in Russian).
  43. Igor Saenko, Anton Sidorov, Sergey Kruglov. Application of genetic algorithms to solve the role mining problem in RBAC systems. 20th All-Russian Conference “Methods and technical tools of information security” (MTTIS 2011)”. Proceedings. St.Petersburg, Russia. June 27 - July 01, 2011. P.89-90. (in Russian).
  44. Andrey Chechulin. Application of combining techniques to the problem of protection against network scanning. 20th All-Russian Conference “Methods and technical tools of information security” (MTTIS 2011)”. Proceedings. St.Petersburg, Russia. June 27 - July 01, 2011. P.63-64. (in Russian).
  45. Ivan Morozov, Andrey Chechulin. Access to information in geographical information systems. 20th All-Russian Conference “Methods and technical tools of information security” (MTTIS 2011)”. Proceedings. St.Petersburg, Russia. June 27 - July 01, 2011. P.34-36. (in Russian).
  46. Vasily Desnitsky. The model of a unified process for development of secure embedded systems. 20th All-Russian Conference “Methods and technical tools of information security” (MTTIS 2011)”. Proceedings. St.Petersburg, Russia. June 27 - July 01, 2011. P.15-16. (in Russian).
  47. Dmitry Komashinkiy. Combining of methods of classification and clustering for the detection and identification malware. 20th All-Russian Conference “Methods and technical tools of information security” (MTTIS 2011)”. Proceedings. St.Petersburg, Russia. June 27 - July 01, 2011. P.136-137. (in Russian).
  48. Alexey Konovalov. Investigation of botnets and distributed defense mechanisms against them based on simulation methods. 20th All-Russian Conference “Methods and technical tools of information security” (MTTIS 2011)”. Proceedings. St.Petersburg, Russia. June 27 - July 01, 2011. P.52-53. (in Russian).
  49. Philipp Nesteruk. The main stages of adaptive security systems development. 20th All-Russian Conference “Methods and technical tools of information security” (MTTIS 2011)”. Proceedings. St.Petersburg, Russia. June 27 - July 01, 2011. P.36-38. (in Russian).
  50. Olga Polubelova. Verification of filtering rules of security policy by "Model Checking". 20th All-Russian Conference “Methods and technical tools of information security” (MTTIS 2011)”. Proceedings. St.Petersburg, Russia. June 27 - July 01, 2011. P.87-88. (in Russian).
  51. Andrey Shorov. Set-theoretic model for simulation of infrastructure attacks against computer networks and defense mechanisms. 20th All-Russian Conference “Methods and technical tools of information security” (MTTIS 2011)”. Proceedings. St.Petersburg, Russia. June 27 - July 01, 2011. P.64-66. (in Russian).
  52. Sergey Ageev, Olga Polubelova. Methods of safety management in protected multiservice networks. 20th All-Russian Conference “Methods and technical tools of information security” (MTTIS 2011)”. Proceedings. St.Petersburg, Russia. June 27 - July 01, 2011. Š.122-124. (in Russian).
  53. Andrey Shorov, Igor Kotenko. The set-theoretic representation of simulation models of infrastructure attacks and defense mechanisms against them // The Fifth All-Russian scientific-practical conference on simulation and its application in science and industry "Simulation. Theory and practice (IMMOD-2009)". St.Petersburg, October 19-21, 2011. Proceedings. St.Petersburg, Technology Center of Shipbuilding and Ship Repair. 2011. P.306-310. (in Russian).
  54. Andrey Chechulin, Igor Kotenko. Analysis of security events in a real network using a network attack modelling system. VII St.Petersburg Interregional Conference «Information Security of Russian Regions (IBRR-2011). October 26-28, 2011. Proceedings. St.Petersburg, 2011. P.97-98. (in Russian).
  55. Vasily Desnitsky, Igor Kotenko, Andrey Chechulin. Configuration model for combined protection of information systems with embedded devices. VII St.Petersburg Interregional Conference «Information Security of Russian Regions (IBRR-2011). October 26-28, 2011. Proceedings. St.Petersburg, 2011. P.69-70. (in Russian).
  56. Elena Doynikova, Andrey Chechulin, Igor Kotenko, Dmitry Kotenko. Extension of the information risks assessment technique to consider zero day attacks.VII St.Petersburg Interregional Conference «Information Security of Russian Regions (IBRR-2011). October 26-28, 2011. Proceedings. St.Petersburg, 2011. P.71-72. (in Russian).
  57. Igor Kotenko, Igor Saenko, Olga Polubelova, Andrey Chechulin. Methods and tools of designing the repository for SIEM system in critical information infrastructure. The VII St.Petersburg Interregional Conference «Information Security of Russian Regions (ISRR-2011). October 26-28, 2011. Proceedings. St.Petersburg, 2011. P.79-80. (in Russian).
  58. Dmitry Komashinkiy, Igor Kotenko. Methods of machine learning in anti-cyberthreat systems. VII St.Petersburg Interregional Conference «Information Security of Russian Regions (IBRR-2011). October 26-28, 2011. Proceedings. St.Petersburg, 2011. P.76-77. (in Russian).
  59. Philipp Nesteruk, Igor Kotenko. The components of development of adaptive computer network security system. VII St.Petersburg Interregional Conference «Information Security of Russian Regions (IBRR-2011). October 26-28, 2011. Proceedings. St.Petersburg, 2011. P.84-85. (in Russian).
  60. Igor Saenko, Igor Kotenko. An improved genetic algorithm to solve the role mining problem in RBAC systems. VII St.Petersburg Interregional Conference “Information Security of Russian Regions (IBRR-2011)”. October 26-28, 2011. Proceedings. St.Petersburg, 2011. P.92-93. (in Russian).
  61. Andrey Chechulin. Cooperation of scanning detection mechanisms. VII St.Petersburg Interregional Conference “Information Security of Russian Regions (IBRR-2011)”. October 26-28, 2011. Proceedings. St.Petersburg, 2011. P.96-97. (in Russian).
  62. Vasily Desnitsky. Configuring effectiveness evaluation for combined protection mechanisms on the basis of optimality problem solving. VII St.Petersburg Interregional Conference “Information Security of Russian Regions (IBRR-2011)”. October 26-28, 2011. Proceedings. St.Petersburg, 2011. P.69. (in Russian).
  63. Elena Doynikova, Dmitry Kotenko. Extension of the information risks assessment technique via application of service dependencies graphs. VII St.Petersburg Interregional Conference “Information Security of Russian Regions (IBRR-2011)”. October 26-28, 2011. Proceedings. St.Petersburg, 2011. P.70-71. (in Russian).
  64. Dmitry Komashinkiy. Methods of machine learning and dynamical malware detection. VII St.Petersburg Interregional Conference “Information Security of Russian Regions (IBRR-2011)”. October 26-28, 2011. Proceedings. St.Petersburg, 2011. P.75-76. (in Russian).
  65. Philipp Nesteruk. The main stages of adaptive security systems development. The VII St.Petersburg Interregional Conference “Information Security of Russian Regions (ISRR-2011)”. October 26-28, 2011. Proceedings. St.Petersburg, 2011. P.83-84. (in Russian).
  66. Olga Polubelova. Applying of linear temporal logic to verification of security policy filtering rules by model checking. VII St.Petersburg Interregional Conference “Information Security of Russian Regions (IBRR-2011)”. October 26-28, 2011. Proceedings. St.Petersburg, 2011. P.88-89. (in Russian).
  67. Olga Polubelova. The ontological approach SIEM data repository implementation. VII St.Petersburg Interregional Conference «Information Security of Russian Regions (IBRR-2011). October 26-28, 2011. Proceedings. St.Petersburg, 2011. P.89. (in Russian).
  68. Igor Saenko, Olga Polubelova, Sergey Ageev. Proposals for conceptual modeling of information security management subsystem in protected multiservice networks. VII St.Petersburg Interregional Conference “Information Security of Russian Regions (IBRR-2011)”. October 26-28, 2011. Proceedings. St.Petersburg, 2011. P.93-94. (in Russian).
  69. Igor Saenko, Andrey Shorov, Ivan Morozov. Access control system in geoinformation systems. VII St.Petersburg Interregional Conference “Information Security of Russian Regions (IBRR-2011)”. October 26-28, 2011. Proceedings. St.Petersburg, 2011. P.94-95. (in Russian).
  70. Andrey Shorov. Architecture of protection mechanism against infrastructure attacks based on the “nervous network system” approach. VII St.Petersburg Interregional Conference “Information Security of Russian Regions (IBRR-2011)”. October 26-28, 2011. Proceedings. St.Petersburg, 2011. P.157-158. (in Russian).
  71. Igor Saenko, Sergey Ageev. Conceptual modeling of access control to the information in core system of information infrastructure. The problem of risk management in techno sphere, St.-Petersburg University of State Fire Service of EMERCOM of Russia. ¹3 [19], 2011. (in Russian).
  72. Igor Saenko, Sergey Alyshev. Methods of optimal routes searching for integrated movement of vehicles in convoys under emergency conditions. Oversight activities and judicial examination in security systems. Scientific reports of young scientists. ¹2, 2011. (in Russian).
  73. Igor Saenko, Sergey Ageev, Alexander Bushuev, Jury Egorov. The concept of information security management automation in protected multiservice networks of special purpose. Automation of managerial processes. Issue 1(23), 2011. P.50-57. (in Russian).
  74. Igor Saenko, Anton Nizhegorodov. The analysis of the development of knowledge base protection systems. IV All-Russian scientific and practical conference with international participation "Scientific creativity in the 21st century", April 2011. Proceeding .Annex to the magazine "In the world of scientific discovery". ¹ 2. Publishing “Research and innovation center". P.86. ISSN 2072-0831. (in Russian).
  75. Igor Saenko, Anton Nizhegorodov, Nikolay Kluchko. The need for protection of databases in modern society. III All-Russian scientific and practical conference with international participation.Modern studies of social problems: Proceeding. Issue 1. Krasnoyarsk, Research and innovation center, 2011. P.224-225. ISBN 978-5-904771-13-3. (in Russian).
  76. Igor Saenko, Anton Nizhegorodov. The need to develop knowledge base protection systems. International scientific and practical conference “Modern tendencies of theoretical and applied research 2011”.Proceeding. Vol.3. Technical science. Odessa: Chernomorya. 2011. P.76–78. (in Russian).
  77. Igor Saenko, Anton Nizhegorodov, Nikolay Kluchko. Analysis of SQL injections as a form of program attack on databases. 66th Scientific and technical conference dedicated to the Day of radio. 19–29 April, 2011. Proceeding.Saint-Petersburg, 2011. P.87-88. (in Russian).
  78. Igor Saenko, Faddey Skorik. Determination of operation scope permissibility for distributed computing. 66th Scientific and technical conference dedicated to the Day of radio. 19–29 April, 2011. Proceeding.Saint-Petersburg, 2011. P.88-89. (in Russian).
  79. Igor Saenko, Sergey Kruglov, Anton Sidorov. Optimization method for scheme of role-based access to information. 66th Scientific and technical conference dedicated to the Day of radio. 19–29 April, 2011. Proceeding.Saint-Petersburg, 2011. P.85-86. (in Russian).
  80. Igor Saenko, Ivan Morozov. The problem of information access control in advanced geographical information systems. 66th Scientific and technical conference dedicated to the Day of radio. 19–29 April, 2011. Proceeding.Saint-Petersburg, 2011. P.84-85. (in Russian).
  81. Igor Saenko, Faddey Skorik, Andrey Shorov. Method of determining the scaling limitations of resources in the grid-systems. XI International scientific and technical conference “Intelligence and science”. (Zheleznovodsk, 28-29 April, 2011).Proceeding. Krasnoyarsk, Information center, 2011. P.133-134. ISBN 978-5-905284-08-3. (in Russian).
  82. Igor Saenko, Sergey Ageev, Yury Sherstuk, Olga Polubelova. A conceptual framework for automating the management of protected multiservice networks. The problem of information security. Computer systems. ¹3, 2011. (in Russian).
  83. Igor Saenko, Sergey Ageev. Basis of mathematical modeling of management tasks for protected multiservice networks. International Congress on Computer Science: Information Systems and Technologies. Proceedings of the International Congress CSIST'2011. Republic of Belarus, Minsk, October 31 – November 3, 2011. In 2 parts. Part 1. Edit.: S.V.Ablameyko et al. Minsk: BSU, 2011. P.282-287. ISBN 978-985-518-563-6. (in Russian).
  84. Igor Saenko, Sergey Alyshev, Alexander Ersov, Vyacheslav Efimov, Ivan Morozov. Searching routes to move vehicles in convoys on the road network by serial method. Certificate about State registration of computer programs No. 2011617681. Registered in computer program register on Federal service for intellectual property, patents and trademarks 03.09.2011 ć. (in Russian).
  85. Oleg Zadan, Elena Doynikova. The problem of management of role-based access to information in a single information space. International scientific and practical conference “ Promising innovations in science, education, production and transport 2011”. Proceeding.Vol.5. Technical science. Odessa: Chernomorya. 2011. P.92. (in Russian).
  86. Igor Saenko, Elena Doynikova, Oleg Zadan. About the actual tasks of the management of the role-based information access systems in a single information space. International scientific and practical conference “Research and their practical application. Current status and development - 2011”.Proceeding. Vol.3. Technical science. Odessa: Chernomorya. 2011. P.82-83. (in Russian).
  87. Nikolay Moldovyan, Evgenia Dernova (Novikova), Dmitri Moldovyan. The Functionality Extension of Digital Signature Standards of Russian Federation and Belorus. Issues of Information Protection. 2011. ¹ 2. P.8-14. (in Russian).
  88. Dmitri Moldovyan, Evgenia Dernova (Novikova), D. Sukhov. The Functionality Extension of Digital Signature Standards. Information Technologies and Computing Systems. 2011. ¹ 2. P.63-67. (in Russian).
  89. Nikolay Moldovyan, Evgenia Dernova (Novikova), Dmitri Moldovyan.The Blind and Collective Digital Signature Protocols based on Standard DSTU 4145-2002. Issues of Information Protection. 2011. ¹ 2. P.14-18. (in Russian).
  90. Roman Kishmar, Petr Moldovyanu, Evgenia Dernova (Novikova), D. Sukhov. The Blind Digital Signature Scheme based on Difficulty of Two Hard Problems. Proceedings ETU "LETI". 2011. ¹ 4. P.44-48 (in Russian).

2010

  1. Vasily Desnitsky,Igor Kotenko. Combined software protection against unauthorized ifluences. Journal of Instrument Engineering, Vol.53, ¹ 11, 2010, P.36-41. ISSN 0021-3454. (in Russian).
  2. Igor Kotenko, Alexey Konovalov, Andrey Shorov. Investigation of botnets and botnet defense based on simulation metnods. Journal of Instrument Engineering, Vol.53, ¹ 11, 2010, P.42-45. ISSN 0021-3454. (in Russian).
  3. Andrey Chechulin, Igor Kotenko. Combining of scanning protection mechanisms in computer networks. Management-information systems, 2010, ¹ 12, P.21-27. ISSN 1684-8853. (in Russian).
  4. Igor Saenko, Yriy Nikitin. Conceptual modeling of control information access system in military geographic information systems. Information and Space. Scientific and technical journal, ¹ 3, 2010, P.76-78. (in Russian).
  5. Igor Saenko, Mochamad Salami, Amer Al-Agbar. Method of determining the required accuracy of the representation of digital cartographic information in automated communication control systems. Information and Space. Scientific and technical journal, ¹ 2, 2010, P.34-36. (in Russian).
  6. Igor Saenko, Yan Kopchak, Sergey Kruglov. Optimization of discretionary access to files in the automated systems based on free software. Problems of information security. Computer systems. ¹ 3, 2010. (in Russian).
  7. V.Desnitsky, I.Kotenko. Protectability and scalability of software protection mechanism based on remote entrusting principles. Risks and security management. Proceedings of Institute of System Analysis of Russian Academy of Science. Moscow, 2010. (in Russian).
  8. Dmitry Komashinskiy, Igor Kotenko. Malware Detection by Data Mining Techniques Based on Positionally Dependent Features. Proceedings of the 18th Euromicro International Conference on Parallel, Distributed and network-based Processing (PDP 2010). Pisa, Italy, 17-19 February, 2010. Los Alamitos, California. IEEE Computer Society. 2010. P.617-623. ISSN 1066-6192. ISBN 978-0-7695-3939-3.
  9. Igor Kotenko, Aleksey Konovalov, Andrey Shorov. Agent-based Modeling and Simulation of Botnets and Botnet Defense. Conference on Cyber Conflict. Proceedings 2010. CCD COE Publications. Tallinn, Estonia, June 15-18, 2010. P.21-44. ISBN 978-9949-9040-1-3.
  10. Igor Kotenko, Viktor Scormin (Eds.) Computer Network Security. Lecture Notes in Computer Science, Springer-Verlag, Vol. 6258. The Fifth International Conference "Mathematical Methods, Models and Architectures for Computer Networks Security" (MMM-ACNS-2010). September 8-10, 2010, St. Petersburg, Russia. P.346. ISSN 0302-974.
  11. Igor Saenko, Igor Kotenko. Genetic Optimization of Access Control Schemes in Virtual Local Area Networks. Computer Network Security. Lecture Notes in Computer Science, Springer-Verlag, Vol. 6258. The Fifth International Conference "Mathematical Methods, Models and Architectures for Computer Networks Security" (MMM-ACNS-2010). September 8-10, 2010, St. Petersburg, Russia. P.209-216. ISSN 0302-9743.
  12. Vasily Desnitsky, Igor Kotenko. Security and Scalability of Remote Entrusting Protection. Lecture Notes in Computer Science, Springer-Verlag, Vol. 6258. The Fifth International Conference "Mathematical Methods, Models and Architectures for Computer Networks Security" (MMM-ACNS-2010). September 8-10, 2010, St. Petersburg, Russia. P.298-306. ISSN 0302-9743.
  13. Igor Kotenko, Aleksey Konovalov, Andrey Shorov. Simulation of Botnets: Agent-based approach. Intelligent Distributed Computing IV. Studies in Computational Intelligence. Springer-Verlag, Vol.315. Proceedings of 4th International Symposium on Intelligent Distributed Computing - IDC'2010. September 16-18, 2010. Tangier, Morocco. Springer. P.247–252.
  14. Dmitry Komashinskiy, Igor Kotenko. Conceptual foundations of Data Mining methods for the detection of malicious software. Information Security. Inside. 2010. ¹ 2, P.74-82. (in Russian).
  15. Igor Kotenko, Aleksey Konovalov, Andrey Shorov. Agent-oriented simulation of botnets functioning and defense against them. Information Security. Inside. 2010. ¹ 4, P.36-45. ¹ 5, P.56-61. (in Russian).
  16. Igor Kotenko, Igor Saenko, Rafael Yusupov. International Conference "Mathematical Methods, Models and Architectures for Computer Networks Security". Information Security. Inside. 2010. ¹ 6, P.16-18. (in Russian).
  17. Dmitry Komashinskiy, Igor Kotenko, Andrey Shorov. Approach to detect malicious software on the basis of position-dependent information. Proceedings of SPIIRAS. Issue 10. St.Petersburg, Nauka, 2010. P.144-159. ISBN 978-5-02-025507-4. (in Russian).
  18. Igor Saenko, Mochamad Salami. The conceptual model of information in multimedia databases. "In the World of Scientific Discoveries”, 2010, 5 (11), Part 1. P.102-104. (in Russian).
  19. Igor Saenko, Mochamad Salami. A conceptual model of representation of multimedia information in databases. International Conference "Promising innovations in science, education, manufacturing and transport '2010”.Proc.Volume 4. Technical sciences. – Odessa, 2010. P.20-23. (in Russian).
  20. Igor Saenko, S.Budilkin, V.Samokhin. The functional structure of a unified automated information system for university communications. Proc. of First All-Russian Conference "Information and communication technology - the main factor in implementing a quality management system of educational institutions on the basis of standard ISO». Chelyabinsk: "Education", 2010. P.32-36. (in Russian).
  21. Igor Saenko, A.Nevrov, Mochamad Salami. Object-oriented data model for digital transport networks. I International Scientific and Practical Conference “Object Systems – 2010”. Proc.Rostov-on-Don, 2010. P.78-82. (in Russian).
  22. Igor Saenko, A.Baranov. Optimization of discretionary access to files in the automated government systems based on free software. All-Russian Conference with international participation “Information technology based on free software”.Proc. Elec, 2010. Elec, 2010. P.37-43. (in Russian).
  23. Igor Saenko, Mochamad Salami. Conceptual modeling of multimedia databases in automated systems of organizational type. 7-th All-Russian Conference “Measurement, Automation and Modeling in Industry and research” (MAMI-2010). Proc.Biisk, 2010. P.83-85. (in Russian).
  24. Igor Saenko, Sergey Alyshev. Methods of finding optimal routes of vehicles in the special conditions. 7-th All-Russian Conference “Measurement, Automation and Modeling in Industry and research” (MAMI-2010). Proc.Biisk, 2010. P.17-20. (in Russian).
  25. Igor Saenko, Sergey Alyshev. A parallel method for finding optimal routes for movement of vehicles in the special conditions. Scientific conference with the elements of a scientific school for young people “Parallel Computer Algebra”.Proc. Stavropol: Publishing and Information Centre "Fabula", 2010. P.344-349. ISBN 978-5-91903-007-2. (in Russian).
  26. Igor Saenko, Anton Nizhegorodov. Analysis of SQL-injections as a form of software-based attacks on the databases. V All-Russian conference with international participation “Actual problems of modern science and education”.Proceedings. Vol. 2. Krasnoyarsk: Research and Innovation Centre, 2010. P.264-266. ISBN 978-5-904771-11-9. (in Russian).
  27. Igor Saenko, Mochamad Salami. The method of object-oriented modeling of multimedia databases based on the transformation of entity-relationship diagram. V All-Russian conference with international participation “Actual problems of modern science and education”.Proceedings. Vol. 2. Krasnoyarsk: Research and Innovation Centre, 2010. P.266-269. ISBN 978-5-904771-11-9. (in Russian).
  28. Igor Kotenko, Aleksey Konovalov, Andrey Shorov. Simulation of operation of teams of intelligent botnet and defense agents. 12th National Conference on Artificial Intelligence with International Participation (CAI-2010). Proceedings. Vol.3. September 20-24, 2010, Tver, Russia. Ģ.: Fizmatlit, 2010. P.44-51. ISBN 978-5-7995-0543-1. (in Russian).
  29. Vasiliy Desnitsky, Igor Kotenko. Development and analysis of remote entrusting protocol. VI St.Petersburg Interregional Conference “Information Security of Russian Regions” (IĀRR-2009). October 28-30, 2009. Proceedings. St.Petersburg, 2010. P.121-129. ISBN 978-5-904031-95-4. (in Russian).
  30. Vasily Desnitsky, Igor Kotenko. Software protection based on the principle of remote entrusting. 5th International Scientific Conference on Security Issues and Counter Terrorism. Lomonosov Moscow State University. October 29-30, 2009. Vol.2. The Eighth All-Russian Scientific Conference "Mathematics and Security of Information Technologies" (MSIT-09). Moscow, 2010. P.159-163. ISBN 978-5-94057-693-8. (in Russian).
  31. Dmitry Komashinskiy, Igor Kotenko. Detecting malware based on the processing of static positional information using Data Mining methods. 5th International Scientific Conference on Security Issues and Counter Terrorism. Lomonosov Moscow State University. October 29-30, 2009. Vol.2. The Eighth All-Russian Scientific Conference "Mathematics and Security of Information Technologies" (MSIT-09). Moscow, 2010. P.136-140. ISBN 978-5-94057-693-8. (in Russian).
  32. Dmitry Komashinskiy, Igor Kotenko. Combining Data Mining methods for static detection of Malware. 12th International Conference “RusCrypto” on Cryptology, Steganography, Digital Signature and Security Systems. Zvenigorod, Russia. April 1-4, 2010. http://www.ruscrypto.ru/ (in Russian).
  33. Andrey Chechulin. Protection against network attacks based on the combined mechanisms of traffic analysis. 12th International Conference “RusCrypto” on Cryptology, Steganography, Digital Signature and Security Systems. Zvenigorod, Russia. April 1-4, 2010. http://www.ruscrypto.ru/ (in Russian).
  34. Y.Zozulya, I.Kotenko. Blocking Web-sites with inappropriate content based on categorization. 12th International Conference “RusCrypto” on Cryptology, Steganography, Digital Signature and Security Systems. Zvenigorod, Russia. April 1-4, 2010. http://www.ruscrypto.ru/ (in Russian).
  35. Aleksey Konovalov, Andrey Shorov, Igor Kotenko. Agent-oriented simulation of botnets. 12th International Conference “RusCrypto” on Cryptology, Steganography, Digital Signature and Security Systems. Zvenigorod, Russia. April 1-4, 2010. http://www.ruscrypto.ru/ (in Russian).
  36. Igor Kotenko. Investigation of botnets and protection mechanisms against them on the basis of agent-based simulation. ÕIX All-Russian Conference “Methods and technical tools of information security” (MTTIS 2010)”. Proceedings. St.Petersburg, Russia. July 5-10, 2010. P.40-41. (in Russian).
  37. Vasiliy Desnitsky, Igor Kotenko. Combined mechanisms to protect software from unauthorized modifications. ÕIX All-Russian Conference “Methods and technical tools of information security” (MTTIS 2010)”. Proceedings. St.Petersburg, Russia. July 5-10, 2010. P.100-101. (in Russian).
  38. Aleksey Konovalov, Igor Kotenko, Andrey Shorov. Simulation environment for imitating network attacks and defense mechanisms. ÕIX All-Russian Conference “Methods and technical tools of information security” (MTTIS 2010)”. Proceedings. St.Petersburg, Russia. July 5-10, 2010. P.38-39. (in Russian).
  39. Michail Stepashkin, Igor Kotenko, Andrey Chechulin, Alexsander Tulupyev, Tatyana Tulupyeva, Anton Pashenko. Approach to security analysis of automated systems taking into account social-engineering attacks. ÕIX All-Russian Conference “Methods and technical tools of information security” (MTTIS 2010)”. Proceedings. St.Petersburg, Russia. July 5-10, 2010. P.128-129. (in Russian).
  40. Igor Kotenko, Mikhail Stepashkin, Andrey Chechulin, Elena Doynikova, Dmitry Kotenko. Tools for security analysis of automated systems. ÕIX All-Russian Conference “Methods and technical tools of information security” (MTTIS 2010)”. Proceedings. St.Petersburg, Russia. July 5-10, 2010. P.115-116. (in Russian).
  41. Andrey Chechulin. Integration and optimal parameters selection of scanning protection mechanisms. ÕIX All-Russian Conference “Methods and technical tools of information security” (MTTIS 2010)”. Proceedings. St.Petersburg, Russia. July 5-10, 2010. P.25-26. (in Russian).
  42. VasilyDesnitsky. Technique of finding the optimum combination of protection methods to protect software from interventions. ÕIX All-Russian Conference “Methods and technical tools of information security” (MTTIS 2010)”. Proceedings. St.Petersburg, Russia. July 5-10, 2010. P.9-10. (in Russian).
  43. Dmitry Komashinskiy. Combining of data mining methods for malware detection. ÕIX All-Russian Conference “Methods and technical tools of information security” (MTTIS 2010)”. Proceedings. St.Petersburg, Russia. July 5-10, 2010. P.112-113. (in Russian).
  44. Andrey Shorov. Simulation of the stage of formation and constraining the botnet spread. ÕIX All-Russian Conference “Methods and technical tools of information security” (MTTIS 2010)”. Proceedings. St.Petersburg, Russia. July 5-10, 2010. P.50-51. (in Russian).
  45. Vasiliy Desnitsky, Andrey Chechulin, Igor Kotenko. Configuration model of embedded devices. XII Saint-Petersburg International Conference “Regional informatics-2010” (“RI-2010”). Proceedings. St. Petersburg, October 20-22, 2010. P.41-42. ISBN 978-5-904031-99-2. (in Russian).
  46. Aleksey Konovalov, Igor Kotenko. Library of modules for botnet simulation. XII Saint-Petersburg International Conference “Regional informatics-2010” (“RI-2010”). Proceedings. St. Petersburg, October 20-22, 2010. P.110-111. ISBN 978-5-904031-99-2. (in Russian).
  47. Vasiliy Desnitsky, Andrey Chechulin. Abstract model of embedded devices. XII Saint-Petersburg International Conference “Regional informatics-2010” (“RI-2010”). Proceedings. St. Petersburg, October 20-22, 2010. P.40-41. ISBN 978-5-904031-99-2. (in Russian).
  48. Elena Doynikova. Risk assessment approaches based on attack graphs. XII Saint-Petersburg International Conference “Regional informatics-2010” (“RI-2010”). Proceedings. St. Petersburg, October 20-22, 2010. P.99-100. ISBN 978-5-904031-99-2. (in Russian).
  49. Elena Doynikova. Applying the fuzzy sets for risk assessment based on attack graphs. XII Saint-Petersburg International Conference “Regional informatics-2010” (“RI-2010”). Proceedings. St. Petersburg, October 20-22, 2010. P.100. ISBN 978-5-904031-99-2. (in Russian).
  50. Dmitry Komashinskiy. Malware: analysis of metadata by Data Mining tools. XII Saint-Petersburg International Conference “Regional informatics-2010” (“RI-2010”). Proceedings. St. Petersburg, October 20-22, 2010. P.109-110. ISBN 978-5-904031-99-2. (in Russian).
  51. Dmitry Kotenko. Analysis of existing approaches to constructing and scalability providing of attack graphs for corporate networks. XII Saint-Petersburg International Conference “Regional informatics-2010” (“RI-2010”). Proceedings. St. Petersburg, October 20-22, 2010. P.113-114. ISBN 978-5-904031-99-2. (in Russian).
  52. Andrey Chechulin. Integrating of malicious traffic detection mechanisms. XII Saint-Petersburg International Conference “Regional informatics-2010” (“RI-2010”). Proceedings. St. Petersburg, October 20-22, 2010. P.149. ISBN 978-5-904031-99-2. (in Russian).
  53. Andrey Chechulin, Vasily Desnitsky, Mikhail Stepashkin. Intruder model in the task of security assurance of embedded system. XII Saint-Petersburg International Conference “Regional informatics-2010” (“RI-2010”). Proceedings. St. Petersburg, October 20-22, 2010. P.150. ISBN 978-5-904031-99-2. (in Russian).
  54. Andrey Shorov. Analysis of DDoS-attacks and defense mechanisms against them and the requirements for their simulation. XII Saint-Petersburg International Conference “Regional informatics-2010” (“RI-2010”). Proceedings. St. Petersburg, October 20-22, 2010. P.152. ISBN 978-5-904031-99-2. (in Russian).
  55. Andrey Shorov. Analysis of bioinspired approaches for protection of computer systems. XII Saint-Petersburg International Conference “Regional informatics-2010” (“RI-2010”). Proceedings. St. Petersburg, October 20-22, 2010. P.151. ISBN 978-5-904031-99-2. (in Russian).
  56. Igor Saenko, Oleg Pantyukhin, Mochamad Salami, Amer Al-Agbar. Genetic approach to solving the problem of choosing the location for the communication system to digital maps. III International Conference “Youth and Science: Reality and Future”. Nevinnomyssk, 2010. Proc.Volume V: Natural and applied sciences. P.398-400. ISBN 978-5-94812-091-1 (in Russian).
  57. Igor Saenko, Oleg Pantyukhin, Yriy Nikitin. On the construction of a mathematical synthesis model of multilayer systems of access control to databases. III International Conference “Youth and Science: Reality and Future”. Nevinnomyssk, 2010. Proc.Volume V: Natural and applied sciences. P.400-402. ISBN 978-5-94812-091-1 (in Russian).
  58. Igor Saenko, Amer Al-Agbar. Application of genetic algorithms to the problem of selecting the location of the company infrastructure on digital maps. II All-Russian Inter-University Conference “Science and education in the development of industrial, social and economic spheres of the Russian regions: Zvorykin reading”. Proc. Murom, 2010. P.153-155. (in Russian).
  59. Igor Saenko, Yriy Nikitin. A mathematical synthesis model of access control systems in the production databases. II All-Russian Inter-University Conference “Science and education in the development of industrial, social and economic spheres of the Russian regions: Zvorykin reading”. Proc. Murom, 2010. P.151-153. (in Russian).
  60. Igor Saenko, Yriy Nikitin, Oleg Pantyukhin. A mathematical synthesis model of the multilayer systems of access control to databases. 62-th Scientific Conference of the faculty, researchers and graduate students. Proc. SPbSUT. St.Pb, 2010. P.68-69. (in Russian).
  61. Igor Saenko, Amer Al-Agbar, Oleg Pantyukhin. Method for estimating the properties of terrains to select the positions of a multi-channel radio with a digital cartographic. 62-th Scientific Conference of the faculty, researchers and graduate students. Proc. SPbSUT. St.Pb, 2010. P.70-71. (in Russian).
  62. Igor Saenko, Sergey Alyshev, A.Nevrov, Mochamad Salami. Issues about a construction of object-oriented models of digital communications networks in the ACS. 65-th STC devoted to Radio Day.Proc. SPb, 2010. P.117-118. (in Russian).
  63. Igor Saenko, Sergey Alyshev, A.Nevrov, Amer Al-Agbar. Approach to state estimation of complex objects of digital communication networks based on fuzzy logic. 65-th STC devoted to Radio Day. Proc. SPb, 2010. P.118-120. (in Russian).
  64. Igor Saenko, Sergey Alyshev, A.Nevrov, Amer Al-Agbar. On the solution of choice a route based on digital maps. 65-th STC devoted to Radio Day.Proc. SPb, 2010. P.120-121. (in Russian).
  65. Igor Saenko, Mochamad Salami. On the technology of constructing a multimedia databases of automated information systems. Regional Inter-University Students scientific and practical conference dedicated to the 65-year anniversary of Victory in Great Patriotic War “Recent trends and current trends of development of automated control systems”. Nizhnekamsk, 2010. P.129-130. (in Russian).
  66. Igor Saenko, A.Baranov, Sergey Kruglov, Yriy Nikitin. The method of constructing schemes of role-base access control to information in the management systems databases. Regional Inter-University Students scientific and practical conference dedicated to the 65-year anniversary of Victory in Great Patriotic War “Recent trends and current trends of development of automated control systems”. Nizhnekamsk, 2010. P.84-86. (in Russian).
  67. Igor Saenko, Amer Al-Agbar. Geoinformation decision-making support on placement in the area means of telecommunications infrastructure. International Conference “Actual problems of modern engineering and technology”. Proc. Lipetsk, 2010. P.88-89. (in Russian).
  68. Igor Saenko, Sergey Alyshev, Oleg Pantyukhin. Automating the road transport movement planning in special circumstances through the application of GIS technologies. X International Conference “Intellect and Science”. Proc.Krasnoyarsk, 2010. ISBN 978-5-7638-2006-5. P.39-40. (in Russian).
  69. Igor Saenko, A.Baranov, Sergey Kruglov. Genetic optimization of the role-based access control schemes based on accounting and processing of variable length "chromosomes". ÕIX All-Russian Conference “Methods and technical tools of information security” (MTTIS 2010)”. Proceedings. St.Petersburg, Russia. July 5-10, 2010. P.22-23. (in Russian).
  70. Igor Saenko. Conceptual synthesis model of the control access scheme to information in a heterogeneous protection environment". ÕIX All-Russian Conference “Methods and technical tools of information security” (MTTIS 2010)”. Proceedings. St.Petersburg, Russia. July 5-10, 2010. P.21-22. (in Russian).
  71. Igor Saenko, A.Sinyuk. Method for automated supply users of computer network identity data through open communication channels. ÕIX All-Russian Conference “Methods and technical tools of information security” (MTTIS 2010)”. Proceedings. St.Petersburg, Russia. July 5-10, 2010. P.82-84. (in Russian).
  72. Igor Saenko, Sergey Alyshev. On the choice of optimal routes for movement of vehicles under special conditions with the use of geographic information technology. International Conference “Actual problems of modern engineering and technology”. Proc. Lipetsk, 2010. P.88-89. (in Russian).
  73. Igor Saenko, Ivan Morozov, Oleg Zhadan. Managing role-based access to automated systems for industrial purposes. International Conference “Actual problems of modern engineering and technology”. Proc. Lipetsk, 2010. P.90-91. (in Russian).
  74. Igor Saenko, Sergey Alyshev. Search model of complex travel routes of vehicles under special conditions, based on GIS technologies. XII Saint-Petersburg International Conference “Regional informatics-2010” (“RI-2010”). Proceedings. St. Petersburg, October 20-22, 2010. P.204-205. ISBN 978-5-904031-99-2. (in Russian).
  75. Igor Saenko, A.Nevrov. The integration of physical security systems based on object-oriented databases. XII Saint-Petersburg International Conference “Regional informatics-2010” (“RI-2010”). Proceedings. St. Petersburg, October 20-22, 2010. P.128-129. ISBN 978-5-904031-99-2. (in Russian).
  76. Igor Saenko, Sergey Kruglov. Optimization technique of role-based access control schemes to data bases of information systems. XII Saint-Petersburg International Conference “Regional informatics-2010” (“RI-2010”). Proceedings. St. Petersburg, October 20-22, 2010. P.115-116. ISBN 978-5-904031-99-2. (in Russian).
  77. Igor Saenko, Anton Nizhegorodov. Analysis of the state of development of database protection systems. XII Saint-Petersburg International Conference “Regional informatics-2010” (“RI-2010”). Proceedings. St. Petersburg, October 20-22, 2010. P.82. ISBN 78-5-904031-99-2. (in Russian).
  78. Igor Saenko, Anton Nizhegorodov, A.Nikitin. Analysis of the domestic systems of database protection and their development prospects. International Conference “Innovative technologies in manufacturing, science and education”. Proc.Grozny, 2010. P.29-30. (in Russian).
  79. Igor Kotenko, Vasily Desnitsky. An Aspect-oriented Approach to Realization of Mobile Module in the Security Model based on Remote Entrusting Mechanism. Information Technologies and Computing Systems, ¹4, 2009. P.67-76. (in Russian).
  80. Dmitri Moldovyan, Evgeniia Dernova (Novikova), Nikolay Moldovyan. Digital Signature Schemes with New Randomization Mechanism. Informatization and Communication. 2010. ¹1. P.66-71. (in Russian).
  81. Lidiya Gortinskaya, Evgenia Dernova (Novikova), Dmitri Moldovyan, Petr Moldovyanu. Construction of the Finite Groups of Vectors for Algorithms of Digital Signature Schemes. Journal of Instrument Engineering.2010. ¹ 5. P.11-16. (in Russian).
  82. Evgenia Dernova (Novikova), Ivan Kupriyanov, Dmitri Moldovyan, Alexandr Moldovyan. Blind Digital Schemes with New Features. Informatization and Communication. 2010. ¹1. P.72-76. (in Russian).

2009

  1. Igor Kotenko, Victor Vorontsov, Andrey Chechulin, Alexander Ulanov. Proactive security mechanisms against network worms: approach, implementation and results of experiments. Information Technologies, No.1, 2009. P.37-42. (in Russian).
  2. Igor Kotenko, Alexander Ulanov. Multi-agent simulation of security mechanisms against distributed computer attacks. Information Technologies, No.2, 2009. P.38-44. (in Russian).
  3. Igor Kotenko, Alexander Ulanov. Investigation of models of counteracting the agents in computer networks. The Multiconference “Theory and Systems of Control”. IV International Conference on Control Sciences (ICCS-IV). January 26-30, 2009. Moscow. 2009. (in Russian).
  4. Igor Kotenko. Framework for Integrated Proactive Network Worm Detection and Response. Proceedings of the 17th Euromicro International Conference on Parallel, Distributed and network-based Processing (PDP 2009). Weimar, Germany. 3. February 18-20, 2009. IEEE Computer Society. 2009. P.379-386.
  5. Vasily Desnitsky, Igor Kotenko. Analysis and Design of Entrusting Protocol for Distributed Software Protection. Proceedings of the Work in Progress Session heldin connection with the 17th Euromicro International Conference on Parallel, Distributed and network-based Processing (PDP 2009). Weimar, Germany. February 2009. SEA-Publications: SEA-SR-21. 2009. P.8-9.
  6. Vasily Desnitsky, Igor Kotenko. Design and Analysis of Remote Entrusting Protocol. The 4th International Scientific Conference on Security Issues and Counter Terrorism. The Seventh All-Russian Scientific Conference "Mathematics and Security of Information Technologies" (MSIT-08). 2009. (in Russian).
  7. Dmitriy Komashinskiy, Igor Kotenko. Investigation of Proactive Mechanisms of Malware Detection based on Data Mining. The 4th International Scientific Conference on Security Issues and Counter Terrorism. The Seventh All-Russian Scientific Conference "Mathematics and Security of Information Technologies" (MSIT-08). 2009. (in Russian).
  8. Andrey Chechulin, Igor Kotenko. Protection against Network Attacks by Methods of Filtering and Normalization of Transport and Network Level Protocols. The 4th International Scientific Conference on Security Issues and Counter Terrorism. The Seventh All-Russian Scientific Conference "Mathematics and Security of Information Technologies" (MSIT-08). 2009. (in Russian).
  9. Igor Kotenko, Rafael Yusupov. Information Technologies for Counteraction against Terrorism. Information Security. Inside, No.2, 2009. (in Russian).
  10. Vasily Desnitsky, Igor Kotenko. Design of Entrusting Protocols for Software Protection. Fourth International Workshop “Information Fusion and Geographical Information Systems” (IF&GIS’09). St.Petersburg, Russia, May 17-20, 2009. Lecture Notes in Geoinformation and Cartography. Springer. 2009.
  11. Dmitriy Komashinskiy, Igor Kotenko. Using Data Mining methods for malware detection. Fourth International Workshop “Information Fusion and Geographical Information Systems” (IF&GIS’09). St.Petersburg, Russia, May 17-20, 2009. Lecture Notes in Geoinformation and Cartography. Springer. 2009.
  12. Andrey Chechulin, Igor Kotenko, Artem Tishkov, Yulia Zozulya, Andrey Shorov. Methods of protection against harmful Web-sites based on reputation evaluation. 11th Conference “RusCrypto” on Cryptology, Steganography, Digital Signature and Security Systems. Zvenigorod, Russia. April 2-5, 2009. http://www.ruscrypto.ru/. (in Russian).
  13. Dmitry Komashinsky, Igor Kotenko, Andrey Shorov. Malware Detection based on Data Mining. 11th Conference “RusCrypto” on Cryptology, Steganography, Digital Signature and Security Systems. Zvenigorod, Russia. April 2-5, 2009. http://www.ruscrypto.ru/ (in Russian).
  14. Vasily Desnitsky, Igor Kotenko. Approach to Software Protection based on Remote Entrusting Mechanism. 11th Conference “RusCrypto” on Cryptology, Steganography, Digital Signature and Security Systems. Zvenigorod, Russia. April 2-5, 2009. http://www.ruscrypto.ru/. (in Russian).
  15. Igor Kotenko. “Network cat-and-mouse”: wars of adaptive software agents. 11th Conference “RusCrypto” on Cryptology, Steganography, Digital Signature and Security Systems. Zvenigorod, Russia. April 2-5, 2009. http://www.ruscrypto.ru/ (in Russian).
  16. Igor Kotenko. Simulation of Agent Teams: the Application of Domain-Independent Framework to Computer Network Security. 23rd European Conference on Modelling and Simulation (ECMS2009). Madrid, Spain. June 9-12, 2009. P.137-143.
  17. Sergey Reznik, Igor Kotenko. Methods and Tools of verification for integrated analysis of security protocols. Information Security. Inside, No.3, 2009. P.56-72. (in Russian).
  18. Andrey Chechulin, Igor Kotenko. Detection and Counteraction of Network Attacks based on Combined Mechanisms of Traffic Analysis. ÕVIII All-Russian Conference “Methods and technical tools of information security” (MTTIS 2009)”. Proceedings. St.Petersburg, Russia. June 29 - July 2, 2009. P.69. (in Russian).
  19. Andrey Shorov, Alexei Konovalov, Igor Kotenko. Investigative Simulation of Botnets and Defence Mechanisms against them. ÕVIII All-Russian Conference “Methods and technical tools of information security” (MTTIS 2009)”. Proceedings. St.Petersburg, Russia. June 29 - July 2, 2009. P.132. (in Russian).
  20. Dmitry Komashinsky, Igor Kotenko, Andrey Shorov. Malware Detection Technology based on Data Mining. ÕVIII All-Russian Conference “Methods and technical tools of information security” (MTTIS 2009)”. Proceedings. St.Petersburg, Russia. June 29 - July 2, 2009. P.122-123. (in Russian).
  21. Igor Kotenko. Simulation of Defence Processes against Attacks on Infrastructure. ÕVIII All-Russian Conference “Methods and technical tools of information security” (MTTIS 2009)”. Proceedings. St.Petersburg, Russia. June 29 - July 2, 2009. P.63. (in Russian).
  22. Kotenko I.V., Reznik S.A., Shorov A.V. Security protocols verification combining existing approaches and tools. Proceedings of SPIIRAS. Issue 8. St.Petersburg, Nauka, 2009. P.292-310. (in Russian).
  23. Andrey Shorov. Analysis of biological approaches for protection of computer networks against infrastructural attacks. VI St.Petersburg Interregional Conference «Information Security of Russian Regions (ISRR-2009). October 28-30, 2009. Proceedings. St.Petersburg, 2009. P.145. (in Russian).
  24. Andrey Chechulin. Detection and counteraction to network attacks on the basis of combined mechanisms of the traffic analysis. VI St.Petersburg Interregional Conference «Information Security of Russian Regions (ISRR-2009). October 28-30, 2009. Proceedings. St.Petersburg, 2009. P.143-144. (in Russian).
  25. Ekaterina Sidelnikova. Verification of filtering rules of computer network security policy on the basis of event calculus and abductive reasoning. The VI St.Petersburg Interregional Conference «Information Security of Russian Regions (ISRR-2009). October 28-30, 2009. Proceedings. St.Petersburg, 2009. P.139-140. (in Russian).
  26. Sergey Reznik. Combined approaches to verification of security protocols. The VI St.Petersburg Interregional Conference «Information Security of Russian Regions (ISRR-2009). October 28-30, 2009. Proceedings. St.Petersburg, 2009. P.122-123. (in Russian).
  27. Alexei Konovalov. Botnet simulation on the basis of a set of cooperating intelligent agents. The VI St.Petersburg Interregional Conference «Information Security of Russian Regions (ISRR-2009). October 28-30, 2009. Proceedings. St.Petersburg, 2009. P.58. (in Russian).
  28. Dmitriy Komashinskiy. Construction of malware static detection model on the basis of Data Mining. VI St.Petersburg Interregional Conference «Information Security of Russian Regions (ISRR-2009). October 28-30, 2009. Proceedings. St.Petersburg, 2009. P.56-57. (in Russian).
  29. Yulia Zozulya. Determining the category of a Web site for parental control task. VI St.Petersburg Interregional Conference «Information Security of Russian Regions (ISRR-2009). October 28-30, 2009. Proceedings. St.Petersburg, 2009. P.53-54. (in Russian).
  30. Vasily Desnitsky. Configutation of software protection mechanism by means of security policies. VI St.Petersburg Interregional Conference «Information Security of Russian Regions (ISRR-2009). October 28-30, 2009. Proceedings. St.Petersburg, 2009. P.97-98. (in Russian).
  31. Vasily Desnitsky. Scalability and security of protection mechanism on the basis of the remote entrusting principle. VI St.Petersburg Interregional Conference «Information Security of Russian Regions (ISRR-2009). October 28-30, 2009. Proceedings. St.Petersburg, 2009. P.98. (in Russian).
  32. Igor Kotenko. Design and Functioning Support of Intelligent Information Security Systems. VI St.Petersburg Interregional Conference «Information Security of Russian Regions (ISRR-2009). October 28-30, 2009. Proceedings. St.Petersburg, 2009. P.112. (in Russian).
  33. Igor Kotenko. Multi-agent Simulation for Investigation of Information Security Machanisms in the Internet. The Fourth All-Russian scientific-practical conference on simulation and its application in science and industry "Simulation. Theory and practice (IMMOD-2009)". St.Petersburg, October 21-23, 2009. Proceedings. St.Petersburg, 2009. Vol. I. P.38-47. (in Russian).
  34. Vasily Desnitsky, Igor Kotenko. Performance and Scalability of Remote Entrusting Protection. Second International Workshop on Remote Entrusting (RE-TRUST 2009). September 30 - October 1, 2009. Riva del Garda, Italy, 2009.
  35. Igor Kotenko, Bogdanov V. Proactive Monitoring of Security Policy Accomplishment in Computer Networks. Proceedings of IEEE Fourth International Workshop on "Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications" (IDAACS'2009). Rende (Cosenza), Italy, September 21-23, 2009.
  36. Michail Stepashkin, Igor Kotenko. Security analysis of computer networks ans systems based on building of attack trees. The St.Petersburg Scientific Forum “Science and Society. Information technologies”. Forth St.Petersburg Meeting of the Nobel Prize laureates. Proceedings. St.Petersburg. 2009. P.363-366. (in Russian).
  37. Igor Kotenko, Rafael Yusupov. Counteraction to cyber terrorism: actual problems and perspective research directions. The St.Petersburg Scientific Forum “Science and Society. Information technologies”. Forth St.Petersburg Meeting of the Nobel Prize laureates. Proceedings. St.Petersburg. 2009. P.329-332. (in Russian).
  38. Igor Kotenko. Intelligent mechanisms of protection against malware propagation. International Conferences “Intelligent systems (AIS 2009)” and “Intelligent CAD (CAD-2009)”. Proceedings. Divnomorskoe, Russia. September 3-10, 2008. Vol.2. Moscow, Fizmatlit, 2009. P.431-438. (in Russian).
  39. Igor Saenko, Yuri Ovsyanikov, Dmitri Guzhva. The method of managing permissions in virtual local area networks using genetic algorithms. Scientific and technical journal Proceedings of the Institute of Engineering Physics. Issue number 1 (11), 2009. (in Russian).
  40. Igor Kotenko. Intelligent mechanisms of cyber security management. Risks and security management. Proceedings of Institute of System Analysis of Russian Academy of Science. Vol.41, Moscow, URSS, 2009. P.74-103. (in Russian).
  41. Gennadiy Nesteruk , Philipp Nesteruk, Lesya Nesteruk. Application of the Formal Model for Describing Processes of Adaptive Information Security in Computer-aided Systems.// © Springer: "Automation and Remote Control", 2009, Vol. 70, ¹ 3. P.491–501.
  42. Evgeniia Dernova (Novikova), Anna Kostina, Nikolay Moldovyan, Petr Moldovyanu. Towards Application of Finite Vector Spaces in Cryptography. Issues of Radioelectronics. 2009, issue. 2. P.165-174. (in Russian).
  43. Petr Moldovyanu, Dmitri Moldovyan, Evgeniia Dernova (Novikova). Usage of Homomorphy and Multidimensional Cyclicity of Finite Group Vectors in Digital Signature Algorithms. Issues of Information Protection. 2009. ¹ 3(86). P.2-9. (in Russian).
  44. Petr Moldovyanu, Dmitri Moldovyan Evgeniia Dernova (Novikova), Anna Kostina. Homomorphy of Finite Vector Groups and Digital Signature Scheme Design. Information Technologies and Computing Systems. 2009 ¹ 4(41). P.33-40. (in Russian).
  45. Moldovyan P.A., Dernova (Novikova) E.S., Kostina A.A., Moldovyan N.A. Multisignature Protocols and Problem of Simultaneous Signing a Package of Contracts // Springer LNGC. 2009. / 4th Int. Workshop IF&GIS'09 Proc. St.Petersburg, May 17-20, 2009. St. Petersburg, Russia

2008

  1. Igor Kotenko. Multi-agent modeling and the simulation of computer network security processes: “a game of network cats and mice”. NATO Science for Peace and Security Series, D: Information and Communication Security. Volume 17, 2008. Aspects of Network and Information Security. P.56-73. ISBN 978-1-58603-856-4.
  2. Igor Kotenko, Alexander Ulanov. Packet Level Simulation of Cooperative Distributed Defense against Internet Attacks. 16th Euromicro International Conference on Parallel, Distributed and network-based Processing (PDP 2008). Toulouse, France. February 13-15 2008. IEEE Computer Society. 2008. P.565-572. ISBN 0-7695-3089-3. ISSN 1066-6192.
  3. Igor Kotenko. Multi-agent Simulation of Attacks and Defense Mechanisms in Computer Networks. The Journal of Computing, Vol. 7, Issue 2, 2008. P.35-43.
  4. Alexander Ulanov, Igor Kotenko. Simulation of Adaptable Agent Teams in Internet. Workshop on Logics for Agents and Mobility (LAM'08). The European Summer School on Logic, Language and Information (ESSLLI 2008), Hamburg, Germany. 4 - 15 August, 2008. P.67-79. (in Russian).
  5. Igor Kotenko, Victor Vorontsov, Artem Tishkov, Andrey Chechulin, Alexander Ulanov. Investigation of Proactive Protection Mechanisms against Network Worms. Third International Scientific Conference on Security Issues and Counter Terrorism "Problems of Security and Counter Terrorism". Materials. Moscow State University. 2008. P.278-283. (in Russian).
  6. Alexander Ulanov, Igor Kotenko. Simulation of Cooperative Mechanisms for Defense of Computer Networks. Third International Scientific Conference on Security Issues and Counter Terrorism "Problems of Security and Counter Terrorism". Materials. Moscow State University. 2008. P.266-271. (in Russian).
  7. Igor Kotenko, Rafael Yusupov. Actual Research in Computer Network and System Security. V Interregional Conference “Information Security of Russian Regions (ISRR-2007)”. Selected Proceedings. St.Petersburg, 2008. P.21-31. (in Russian).
  8. Vasily Desnitsky, Igor Kotenko. Model of Software Protection based on “Remote Retrusting” Mechanism. V Interregional Conference “Information Security of Russian Regions (ISRR-2007)”. Selected Proceedings. St.Petersburg, 2008. P.172-177. (in Russian).
  9. Igor Kotenko, Alexander Ulanov. Investigation of Protection Mechanisms against DDoS Attacks: Imitation of Counteraction between Intelligent Agents in the Internet. 10th Conference “RusCrypto” on Cryptology, Steganography, Digital Signature and Security Systems. Zvenigorod, Russia. April 3-5, 2008. CD ROM. http://www.ruscrypto.ru/. (in Russian).
  10. Igor Kotenko. Proactive Protection Mechanisms against rapidly propagating Network Worms. 10th Conference “RusCrypto” on Cryptology, Steganography, Digital Signature and Security Systems. Zvenigorod, Russia. April 3-5, 2008 CD ROM. http://www.ruscrypto.ru/. (in Russian).
  11. Igor Kotenko, Vasily Desnitsky. Aspect-oriented Approach to Realization of Mobile Module in “Remote Retrusting” Protection Model. Information Technologies and Computing Systems, No.2, 2008. (in Russian).
  12. Vasily Desnitsky, Igor Kotenko. Model of Software Protection based on Remote Entrusting Mechanism. News of High schools. Journal of Instrument Engineering, Vol.51, ¹11, 2008. P.26-30. ISSN 0021-3454. (in Russian).
  13. Victor Vorontsov, Igor Kotenko. Analysis of Credit based Mechanism of Network Worm Epidemic Detection and Containment. News of High schools. Instrument making, Vol.51, No.11, 2008. P.21-26. ISSN 0021-3454. (in Russian).
  14. Ekaterina Sidelnikova, Artem Tishkov, Igor Kotenko. Filtering Policy Verification based on Event Calculus and Abduction Reasoning. News of High schools. Journal of Instrument Engineering, Vol.51, ¹11, 2008. P.31-35. ISSN 0021-3454. (in Russian).
  15. Olga Polubelova, Igor Kotenko. Verification of Filtering Rules of Security Policy by Model Checking. News of High schools. Instrument making, Vol.51, No.12, 2008. P.44-49. ISSN 0021-3454. (in Russian).
  16. Andrey Chechulin, Igor Kotenko. Investigation of Virus Throttling Defense Mechanisms against Network Worms. Information Security. Inside, ¹3, 2008. P.68-73. (in Russian).
  17. Vasily Desnitsky, Igor Kotenko, Sergey Reznik. Design and Verification of message exchange protocol for software protection based on “Remote Entrusting” mechanism. Information Security. Inside, No.4, 2008. P.59-63; No.5, 2008. P.68-74. (in Russian).
  18. Vasily Desnitsky, Igor Kotenko, Sergey Reznik. Design and Analysis of message exchange protocol for software protection based on “Remote Entrusting”. ÕVII All-Russian Conference “Methods and technical tools of information security” (MTTIS 2008)”. Proceedings. St.Petersburg, Russia. June 27-29, 2008. (in Russian).
  19. Igor Kotenko, Victor Vorontsov, Andrey Chechulin. Detection and Containment of Spreading malware by means of combined protection mechanisms. ÕVII All-Russian Conference “Methods and technical tools of information security” (MTTIS 2008)”. Proceedings. St.Petersburg, Russia. June 27-29, 2008. (in Russian).
  20. Igor Kotenko, Artem Tishkov, Victor Vorontsov. Combining of malware protection mechanisms. International Conferences “Intelligent systems (AIS 2008)” and “Intelligent CAD (CAD-2008)”. Proceedings. Divnomorskoe, Russia. September 3-10, 2008. Moscow, Fizmatlit, 2008. (in Russian).
  21. Vasily Desnitsky, Igor Kotenko, Sergey Reznik. Design and Analysis of message exchange protocol for “Remote Entrusting” mechanism. International Conferences “Intelligent systems (AIS 2008)” and “Intelligent CAD (CAD-2008)”. Proceedings. Divnomorskoe, Russia. September 3-10, 2008. Moscow, Fizmatlit, 2008. (in Russian).
  22. Igor Kotenko, Alexander Ulanov. Simulation of adaptation of counteracting intelligent agent teams. XI National Conference on Artificial Intelligence with International Participation (NCAI-2008). Proceedings. Vol.1. Dubna, Russia. September 29 – October 3, 2008. Ģ.: URSS, 2008. P.32-40. ISBN 978-5-9710-0226-0. (in Russian).
  23. Igor Kotenko. Intelligent Mechanisms of Cyber-Security Management. Risks and security management. Proceedings of Institute of System Analysis of Russian Academy of Science. Moscow, URSS, 2008. (in Russian).
  24. Igor Kotenko, Rafael Yusupov. Information Technologies for Terrorism Counteraction. XI International Conference “Regional informatics-2008” (“RI-2008”). Proceedings. St. Petersburg, October 21-23, 2008. P.39-40. (in Russian).
  25. Andrey Shorov, Igor Kotenko. Protection of Computer Network against Infrastructure Attacks based on “Network Nervous System” Realization. XI International Conference “Regional informatics-2008” (“RI-2008”). Proceedings. St. Petersburg, October 21-23, 2008. P.118-119. (in Russian).
  26. Vitaly Bogdanov. Optimization of Computer Network Security Policy Testing. XI International Conference “Regional informatics-2008” (“RI-2008”). Proceedings. St. Petersburg, October 21-23, 2008. P.93. (in Russian).
  27. Vasily Desnitsky. Design and Analysis of Protocol for Protecting the Programs against Malicious Modifications. XI International Conference “Regional informatics-2008” (“RI-2008”). Proceedings. St. Petersburg, October 21-23, 2008. P.98-99. (in Russian).
  28. Dmitriy Komashinskiy. Proactive Technology of Malware Detection by means of Data Mining. XI International Conference “Regional informatics-2008” (“RI-2008”). Proceedings. St. Petersburg, October 21-23, 2008. P.101. (in Russian).
  29. Alexei Konovalov. Simulation of Network Traffic in the Tasks of Protection against Network Infrastructure Threats. XI International Conference “Regional informatics-2008” (“RI-2008”). Proceedings. St. Petersburg, October 21-23, 2008. P.101-102. (in Russian).
  30. Dmitriy Kotenko. Design of Attack Graph for Evaluation of Computer Network Security. XI International Conference “Regional informatics-2008” (“RI-2008”). Proceedings. St. Petersburg, October 21-23, 2008. P.102-103. (in Russian).
  31. Olga Polubelova. Verification of Security Policy Filtering Rules containing Temporal Parameters by Model Checking. XI International Conference “Regional informatics-2008” (“RI-2008”). Proceedings. St. Petersburg, October 21-23, 2008. P.110-111. (in Russian).
  32. Sergey Reznik. Integrated Approach to Security Protocol Verification on an Example of RE-TRUST Protocol. XI International Conference “Regional informatics-2008” (“RI-2008”). Proceedings. St. Petersburg, October 21-23, 2008. P.111. (in Russian).
  33. Ekaterina Sidelnikova. Abductive Configurator of Firewall Filtering Rules. XI International Conference “Regional informatics-2008” (“RI-2008”). Proceedings. St. Petersburg, October 21-23, 2008. P.112. (in Russian).
  34. Andrey Chechulin. Defense against Network Attacks by Normalization of Transport and Network Level Protocols of TCP/IP Stack. XI International Conference “Regional informatics-2008” (“RI-2008”). Proceedings. St. Petersburg, October 21-23, 2008. P.115-116. (in Russian).
  35. Ekaterina Sidelnikova. Verification of Filtering Policies by means of Event Calculus and Abductive Reasoning. V Interregional Conference “Information Security of Russian Regions (ISRR-2007)”. Selected Proceedings. St.Petersburg, 2008. P.133-136. (in Russian).
  36. Igor Kotenko, Victor Vorontsov, Andrey Chechulin. Analysis of Network Worm Detection and Containment Mechanisms. V Interregional Conference “Information Security of Russian Regions (ISRR-2007)”. Selected Proceedings. St.Petersburg, 2008. P.113-119. (in Russian).
  37. Philipp Nesteruk , Lesya Nesteruk, Gennadiy Nesteruk. Modeling of Neural-Network Security Tools for Computer-aided Systems: A formal Model of Adaptation and Operation. I. // SpringerLink: “Automation and Remote Control”, 2008, Vol. 69, ¹ 9. P.1603–1614
  38. Philipp Nesteruk , Lesya Nesteruk, Gennadiy Nesteruk. On modeling neural-network protection facilities for computer-aided systems: A formal model of adaptation and operation. II.// Springer: “Automation and Remote Control”, 2008, Vol. 70, ¹ 2. P.283-300.
  39. Evgeniia Dernova (Novikova), Nikolay Moldovyan. Design of Digital Signature Schemes based on Several Hard Problems. Issues of Information Protection. 2008. ¹ 1. P.22-26. (in Russian).
  40. Evgeniia Dernova (Novikova), Nikolay Moldovyan. Collective Digital Signature Protocol based on Two Hard Problems. Security of Infortmation Technologies. 2008 ¹2. P.79-85. (in Russian).
  41. Evgeniia Dernova (Novikova), Dmitri Moldovyan, Petr Moldovyanu. The construction of the Finite Augmented Field for Cryptographic Applications. Issues of Information Protection. 2008. ¹ 3(82). P.2-7. (in Russian).
  42. Evgeniia Dernova (Novikova), Anna Kostina, Petr Moldovyanu. Using Finite Group of Matrices for Digital Signature Algorithms Construction. Issues of Information Protection. 2008. ¹ 3(82). P.8-12. (in Russian).
  43. Denis Guryanov, Evgeniia Dernova (Novikova), V. Izbash, Dmitri Moldovyan. Algorithms of Digital Signature Based on Difficulty of Rooting Problem in Finite Groups of Known Order. Information Technologies and Computing Systems. 2008 ¹ 5. P.33-40. (in Russian).

2007

  1. Igor Kotenko, Alexander Ulanov. Agent-Oriented Environment for Simulation and Evaluation of “Distributed Denial of Service” Defence Mechanisms. Journal of Instrument Engineering,Vol.50, ¹1, 2007, P.18-21. (in Russian).
  2. Igor Kotenko, Rafael Yusupov. Computer security Technologies. Herald of the Russian Academy of Sciences, Vol.77, ¹4, 2007. P.323-333. (in Russian).
  3. Igor Kotenko, Alexander Ulanov. Multiagent Modeling and Simulation of Protecting the Information Resources of Computer Networks in the Internet. Herald of the Russian Academy of Sciences.Journal of Computer and Systems Sciences International, ¹ 5, 2007, P.74-88. (in Russian).
  4. Igor Kotenko, Artem Tishkov, Olga Chervatuk, Sergey Reznik, Ekaterina Sidelnikova. System of Verification of Computer Network Security Policy. Herald of computer and information technologies, ¹11, 2007. P.48-56. (in Russian).
  5. Igor Kotenko, Alexander Ulanov. Modeling and Simulation of Adaptive Cooperative Defense against Computer Attacks in the Internet. Problems of risks and security management. Proceedings of Institute of System Analysis of Russian Academy of Science. Moscow, URSS, 2007. (in Russian).
  6. Igor Kotenko, Mikhail Stepashkin. Computer Network Security Evaluation based on Attack Graphs Analysis. Problems of risks and security management. Proceedings of Institute of System Analysis of Russian Academy of Science. Moscow, URSS, 2007. (in Russian).
  7. Alexander Ulanov, Igor Kotenko. Defense against DDoS Attacks: Mechanisms of Prevention, Detection, Source Tracking and Counteraction. Information Security. Inside, ¹1, 2007, P.60-67; ¹2, 2007,P.70-77; ¹3, 2007, P.62-69. (in Russian).
  8. Vitaly Bogdanov, Igor Kotenko. Proactive Monitoring of Security Policy Performance in Computer Networks. Information Security. Inside, ¹3, 2007,P.42-47; ¹4, 2007,P.66-72. (in Russian).
  9. Igor Kotenko, Alexander Ulanov. Computer Wars in the Internet: Modeling and Simulation of Program Agents Counteraction. Information Security. Inside, ¹4, 2007,P.38-45. (in Russian).
  10. Igor Kotenko. Automatic Detection and Constraining of Internet Worm Propagation: Brief Analysis of Modern Research. Information Security. Inside, No. 4, 2007. P.46-56. (in Russian).
  11. Igor Kotenko. International Conference “Mathematical Methods, Models and Architectures for Computer Networks Security” (MMMACNS-07). Information Security. Inside, No. 3, 2007, P.12; No. 4, 2007, P.56. (in Russian).
  12. Igor Kotenko, Artem Tishkov, Ekaterina Sidelnikova, Olga Chervatuk. Checking of Security Policy Rules for Corporate Computer Networks. Information Security. Inside, No. 5, 2007. P.46-49; No. 6, 2007. P.36-43. (in Russian).
  13. Igor Kotenko, Victor Vorontsov. Analytical Models of Network Worm Propagation. Proceedings of SPIIRAS. Issue 4, Vol.1. St.Petersburg, Nauka, 2007. P.225-238. (in Russian).
  14. Igor Kotenko, Victor Vorontsov, Alexander Ulanov. Models and Systems of Network Worm Propagation Simulation. Proceedings of SPIIRAS. Issue 4, Vol.1. St.Petersburg, Nauka, 2007. P.208-224. (in Russian).
  15. Igor Kotenko. Actual Issues of Modeling and Simulation of Information Security Processes on the basis of Technology of Intelligent Agents. Transactions of Saint Petersburg Electrotechnical University “LETI” (ETU). Special issue. Information science problems: philosophy, sociology of science, education. St.Petersburg, SPbETU “LETI”, 2007. P.93-109. (in Russian).
  16. Igor Kotenko, Alexander Ulanov. Opposition in the Internet: Modeling and Simulation of Counteraction to Distributed Cyber-attacks. Second International Scientific Conference on Security Issues and Counter Terrorism "Problems of Security and Counter Terrorism". Materials. Moscow State University. 2007. P.485-494. (in Russian).
  17. Vitaly Bogdanov, Igor Kotenko. The Proactive Approach to Monitoring of Computer Network Policy. Second International Scientific Conference on Security Issues and Counter Terrorism "Problems of Security and Counter Terrorism". Materials. Moscow State University. 2007. P.373-382. (in Russian).
  18. Artem Tishkov, Igor Kotenko, Ekaterina Sidelnikova, Olga Chervatuk. Detection and Resolution of Conflicts in Security Policies. Second International Scientific Conference on Security Issues and Counter Terrorism "Problems of Security and Counter Terrorism". Materials. Moscow State University. 2007. P.172-185. (in Russian).
  19. Igor Kotenko, Mikhail Stepashkin. Evaluating the Computer Network Security on the Basis of Attack Graph Analysis. Second International Scientific Conference on Security Issues and Counter Terrorism "Problems of Security and Counter Terrorism". Materials. Moscow State University. 2007. P.466-481. (in Russian).
  20. Vitaly Bogdanov, Igor Kotenko, Mikhail Stepashkin. Proactive Approach to Network Security Policy Monitoring. Proceedings of the International Security and Counteracting Terrorism Conference. Moscow. Lomonosov Moscow State University Intellectual Center. 2007. 4 p.
  21. Mikhail Stepashkin, Igor Kotenko, Vitaly Bogdanov. Network Security Evaluation based on Analysis of Attack Graphs. Proceedings of the International Security and Counteracting Terrorism Conference. Moscow. Lomonosov Moscow State University Intellectual Center. 2007. 5 p.
  22. Artem Tishkov, Igor Kotenko, Ekaterina Sidelnikova, Olga Chervatuk. Detection and Resolution of Inconsistencies in Security Policy. Proceedings of the International Security and Counteracting Terrorism Conference. Moscow. Lomonosov Moscow State University Intellectual Center. 2007. 5 p.
  23. Igor Kotenko, Alexander Ulanov. Confrontation in the Internet: Simulation of Counteraction to Distributed Cyber-Attacks. Proceedings of the International Security and Counteracting Terrorism Conference. Moscow. Lomonosov Moscow State University Intellectual Center. 2007. 4 p.
  24. Igor Kotenko, Artem Tishkov, Olga Chervatuk, Ekaterina Sidelnikova. Security Policy Verification Tool for Geographical Information Systems. Third International Workshop “Information Fusion and Geographical Information Systems” (IF&GIS’07). St.Petersburg, Russia, May 27-29, 2007. Lecture Notes in Geoinformation and Cartography. Springer. Popovich, Vasily V.; Schrenk, Manfred; Korolenko, Kyrill V. (Eds.). 2007. P.128-146.
  25. Julien Bourgeois, Abdoul Karim Ganame, Igor Kotenko, Alexander Ulanov. Software Environment for Simulation and Evaluation of a Security Operation Center. Third International Workshop “Information Fusion and Geographical Information Systems” (IF&GIS’07). St.Petersburg, Russia, May 27-29, 2007. Lecture Notes in Geoinformation and Cartography. Springer. Popovich, Vasily V.; Schrenk, Manfred; Korolenko, Kyrill V. (Eds.). 2007. P.111-127.
  26. Igor Kotenko, Alexander Ulanov. Multi-agent Framework for Simulation of Adaptive Cooperative Defense against Internet Attacks. Proceedings of International Workshop on Autonomous Intelligent Systems: Agents and Data Mining (AIS-ADM-07). St. Petersburg, Russia. June 3-5, 2007. Lecture Notes in Artificial Intelligence, Vol.4476, 2007. P.212-228.
  27. Igor Kotenko, Alexander Ulanov. Agent-based Simulation Environment and Experiments for Investigation of Internet Attacks and Defense Mechanisms. Proceedings of 21th European Conference on Modelling and Simulation (ECMS 2007). Prague, Czech Republic. 4-6 June 2007. P.146-155.
  28. Igor Kotenko, Olga Chervatuk, Ekaterina Sidelnikova, Artem Tishkov. Hybrid Multi-module Security Policy Verification. 2007 IEEE Workshop on Policies for Distributed Systems and Networks (Policy 2007). 13-15 June 2007. Bologna, Italy. 2007. P.277.
  29. Vitaly Bogdanov, Igor Kotenko. Proactive Monitoring of Performance of Computer Network Security Policy. ÕVI All-Russian Conference “Methods and technical tools of information security” (MTTIS 2007)””. June 27-29, 2007. St. Petersburg, Proceedings. SPbSPU. 2007. P.32. (in Russian).
  30. Igor Kotenko, Victor Vorontsov, Alexander Ulanov. Proactive Detection and Constraining of Network Worm Propagation. ÕVI All-Russian Conference “Methods and technical tools of information security” (MTTIS 2007)””. June 27-29, 2007. St. Petersburg, Proceedings. SPbSPU. 2007. P.91. (in Russian).
  31. Igor Kotenko, Alexander Ulanov. Simulation of Adaptive Opposition of Defense Systems to Distributed Attacks. ÕVI All-Russian Conference “Methods and technical tools of information security” (MTTIS 2007)””. June 27-29, 2007. St. Petersburg, Proceedings. SPbSPU. 2007. P.92. (in Russian).
  32. Igor Kotenko, Alexander Ulanov. Investigation of Cooperative Defense against DDoS. SECRYPT 2007. International Conference on Security and Cryptography. Proceedings. Barcelona, Spain. 28-31 July 2007. P.180-183.
  33. Igor Kotenko, Victor Vorontsov. Proactive Approach to Detection and Restraining of Network Worms. International Conferences “Intelligent systems (AIS'07)” and “Intelligent CAD (CAD-2007)”. Proceedings.Moscow, Fizmatlit, 2007. Moscow, Fizmatlit, 2007. P.61-68. (in Russian).
  34. Vasily Desnitsky, Igor Kotenko. Models of Remote Authentication for Software Protection. International Conferences “Intelligent systems (AIS'07)” and “Intelligent CAD (CAD-2007)”. Proceedings.Moscow, Fizmatlit, 2007. P.43-50. (in Russian).
  35. Igor Kotenko. Multi-agent Modelling and Simulation of Cyber-Attacks and Cyber-Defense for Homeland Security. Proceedings of IEEE Fourth International Workshop on "Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications" (IDAACS'2007). Dortmund, Germany, 6-8 September, 2007. P.614-619.
  36. Vladimir Gorodetsky, Igor Kotenko, Victor Skormin (Eds.). The Forth International Conference Mathematical Methods, Models and Architectures for Computer Networks Security (MMM-ACNS 2007). St. Petersburg, Russia, September 13–15, 2007. Communications in Computer and Information Science (CCIS). Springer. . Vol.1, 2007. 416 š.
  37. Vitaly Bogdanov, Igor Kotenko. Policy-based Proactive Monitoring of Security Policy Performance.The Forth International Conference Mathematical Methods, Models and Architectures for Computer Networks Security (MMM-ACNS 2007). St. Petersburg, Russia, September 13–15, 2007. Proceedings. Communications in Computer and Information Science (CCIS). Springer. Vol.1, 2007. P.197-212.
  38. Artem Tishkov, Ekaterina Sidelnikova, Igor Kotenko. Event Calculus based Checking of Filtering Policies. The Forth International Conference Mathematical Methods, Models and Architectures for Computer Networks Security (MMM-ACNS 2007). St. Petersburg, Russia, September 13–15, 2007. Proceedings. Communications in Computer and Information Science (CCIS). Springer. Vol.1, 2007. P.248-253.
  39. Igor Kotenko. Models and Methods of Construction and Support of Functioning of Intelligent Adaptive Security Systems. The 13th All-Russian Conference"Mathematical Methods of Pattern Recognition"(ĢĢŠR-13). Zelenogorsk. September 30 October 6, 2007. Proceedings. Moscow, MAKS Press, 2007. P.599-602. (in Russian).
  40. Alexander Ulanov, Igor Kotenko. Multiagent Environment for Carrying out of Experiments on Protection of Computer Networks. The 13th All-Russian Conference"Mathematical Methods of Pattern Recognition"(ĢĢŠR-13). Zelenogorsk. September 30 October 6, 2007. Proceedings. Moscow, MAKS Press, 2007. P.631-634. (in Russian).
  41. Igor Kotenko, Victor Vorontsov. Use of Proactive Approach for Protection against Network Worms. Scientific-practical Symposium “National Information Systems and State Security”. Proceedings. Moscow, Russia. September 2007. P.78-81. (in Russian).
  42. Vasily Desnitsky, Igor Kotenko. Remote Authentication for Protection of Programs against Non-authorized Modification. Scientific-practical Symposium “National Information Systems and State Security”. Proceedings. Moscow, Russia. September 2007. P.81-84. (in Russian).
  43. Alexander Ulanov, Igor Kotenko. Simulation of Adaptive Cooperative Strategies of Defense against Internet Attacks. The Third All-Russian Scientific-practical Conference on Simulation and its Application in Science and Industry “Simulation. Theory and Practice (IMMOD-2005)”. St.Petersburg, Russia. October 17-19, 2007. Proceedings. St.Petersburg, 2007. Vol.II. P.211-215. (in Russian).
  44. Igor Kotenko, Alexander Ulanov, Artem Tishkov, Vitaly Bogdanov, Victor Vorontsov, Andrey Chechulin. Simulation of Network Worm Detection and Containment in Computer Networks. The Third All-Russian Scientific-practical Conference on Simulation and its Application in Science and Industry “Simulation. Theory and Practice (IMMOD-2005)”. St.Petersburg, Russia. October 17-19, 2007. Proceedings. St.Petersburg, 2007. Vol.II. P.106-109. (in Russian).
  45. Igor Kotenko, Rafael Yusupov. Actual Issues and Solutions in the Field of Protection of Computer Networks and Systems. V St.Petersburg Interregional Conference “Information Security of Russian Regions (ISRR-2007)”. St.Petersburg, Russia. October 23-25, 2007. Conference Proceedings. St.Petersburg, 2007. P.55-56. (in Russian).
  46. Artem Tishkov, Igor Kotenko. Computer Network Protection System based on Security Policy. V St.Petersburg Interregional Conference “Information Security of Russian Regions (ISRR-2007)”. St.Petersburg, Russia. October 23-25, 2007. Conference Proceedings. St.Petersburg, 2007. P.122-123. (in Russian).
  47. Vasily Desnitsky, Igor Kotenko. Model of Protecting the Programs against Non-authorized Changes on the Basis of Remote Trust Mechanism. V St.Petersburg Interregional Conference “Information Security of Russian Regions (ISRR-2007)”. St.Petersburg, Russia. October 23-25, 2007. Conference Proceedings. St.Petersburg, 2007. P.81. (in Russian).
  48. Victor Vorontsov, Igor Kotenko. Models of detection and containment of network worms on the basis of proactive approach. V St.Petersburg Interregional Conference “Information Security of Russian Regions (ISRR-2007)”. St.Petersburg, Russia. October 23-25, 2007. Conference Proceedings. St.Petersburg, 2007. P.47-48. (in Russian).
  49. Andrey Chechulin, Igor Kotenko. Mechanisms of protection against network worms on the basis of threshold random walk method. V St.Petersburg Interregional Conference “Information Security of Russian Regions (ISRR-2007)”. St.Petersburg, Russia. October 23-25, 2007. Conference Proceedings. St.Petersburg, 2007. P.70. (in Russian).
  50. Alexander Ulanov. Models of Counteracting the Agent Teams realizing DDoS Attacks and Mechanisms of Protection against them. International Conferences “Intelligent systems (AIS'07)” and “Intelligent CAD (CAD-2007)”Proceedings . Moscow, Fizmatlit, 2007. P.120-127. (in Russian).
  51. Sergey Reznik, Olga Chervatuk. Detection of Filtering and Channel Protection Conflicts in Security Policy on the Basis of Model Checking. ÕVI All-Russian Conference “Methods and technical tools of information security” (MTTIS 2007)””. June 27-29, 2007. St. Petersburg, Proceedings. SPbSPU. 2007. P.37. (in Russian).
  52. Vasily Desnitsky. Remote Authentication as the Mechanism of Software Protection on Remote Clients. ÕVI All-Russian Conference “Methods and technical tools of information security” (MTTIS 2007)””. June 27-29, 2007. St. Petersburg, Proceedings. SPbSPU. 2007. P.5. (in Russian).
  53. Alexander Ulanov. Architecture and Model of the Environment of Multiagent Simulation of DDoS Attacks and Protection against them. ÕVI All-Russian Conference “Methods and technical tools of information security” (MTTIS 2007)””. June 27-29, 2007. St. Petersburg, Proceedings. SPbSPU. 2007. P.96. (in Russian).
  54. Victor Vorontsov. Modeling of Network Worm Propagation.ÕVI All-Russian Conference “Methods and technical tools of information security” (MTTIS 2007)””. June 27-29, 2007. St. Petersburg, Proceedings. SPbSPU. 2007. C.88. (in Russian).
  55. Alexander Ulanov. Technique of Simulating the Opposition of Defense Systems to DDOS Attacks in the Internet. Scientific-practical Symposium “National Information Systems and State Security”. Proceedings. Moscow, Russia. September 2007. P.85-87. (in Russian).
  56. Vasily Desnitsky. Aspect-oriented Approach to Mobile Module Realization in Software Protection System. Scientific-practical Symposium “National Information Systems and State Security”. Proceedings. Moscow, Russia. September 2007. P.87-89. (in Russian).
  57. Victor Vorontsov. The Mechanism of Detection and Containment of Network Worm Propagation on the Basis of Trust Credits. V St.Petersburg Interregional Conference “Information Security of Russian Regions (ISRR-2007)”. St.Petersburg, Russia. October 23-25, 2007. Conference Proceedings. St.Petersburg, 2007. P.46-47. (in Russian).
  58. Vasily Desnitsky. Realization of Mobile Module Replacement Mechanism on the Basis of Aspect-oriented Programming Paradigm. V St.Petersburg Interregional Conference “Information Security of Russian Regions (ISRR-2007)”. St.Petersburg, Russia. October 23-25, 2007. Conference Proceedings. St.Petersburg, 2007. P.49-50. (in Russian).
  59. Olga Chervatuk. Verification of Filtering Rules of Security Policy by Model Checking. V St.Petersburg Interregional Conference “Information Security of Russian Regions (ISRR-2007)”. St.Petersburg, Russia. October 23-25, 2007. Conference Proceedings. St.Petersburg, 2007. P.69-70. (in Russian).
  60. Andrey Chechulin. Investigation of Network Worm Detection and Containment Mechanisms based on Virus Throttling. V St.Petersburg Interregional Conference “Information Security of Russian Regions (ISRR-2007)”. St.Petersburg, Russia. October 23-25, 2007. Conference Proceedings. St.Petersburg, 2007. P.99-100. (in Russian).
  61. Ekaterina Sidelnikova. Verification of Filtering Rules based on Event Calculation and Abductive Reasoning. V St.Petersburg Interregional Conference “Information Security of Russian Regions (ISRR-2007)”. St.Petersburg, Russia. October 23-25, 2007. Conference Proceedings. St.Petersburg, 2007. P.95. (in Russian).
  62. Dmitriy Komashinskiy. Sensor networks information security. Works of the V Inter-regional Conference "Information Security of Russia Regions", section "Information security of telecommunication networks" St. Petersburg, October 23-25, 2007. P.40. (in Russian).

2006

  1. Alexander Ulanov. Multi-agent simulation of distributed attacks "denial of service" and defense mechanisms // International school-conference on priority courses of science and technology development with participation of young scientists, PhD students and students. Moscow, 2006. P.65-57. (in Russian).
  2. Artem Tishkov, Olga Chervatuk, Dmitry Lakomov, Sergey Reznik, Ekaterina Sidelnikova. Detection and resolution of inconsistencies in the specifications of complex systems.X National Conference on Artificial Intelligence with International Participation (CAI-2006). Proceedings. Vol. 1. Moscow, Fizmatlit, 2006. P.87-90. ISBN: 5-9221-0757-7. (in Russian).
    NCAI-06-A-Tishkov.pdf [application/pdf] (8427 bytes)
    NCAI-06-Tishkov.pdf [application/pdf] (338635 bytes)
  3. Igor Kotenko, Mikhail Stepashkin, Alexander Ulanov. Agent-based modeling and simulation of malefactors' attacks against computer networks. Security and Embedded Systems. D.N.Serpanos, R.Giladi (Eds.). IOS Press. 2006. P.139-146. ISSN 1574-5589.
    NATO-ASI-06-Cover.jpg [image/jpeg] (168841 bytes)
    NATO-ASI-06-paper.pdf [application/pdf] (187094 bytes)
  4. Igor Kotenko, Mikhail Stepashkin, Vitaly Bogdanov. Architectures and models of active security analysis components on the basis of imitation of malefactors' actions. Problems of information security. Computer systems. 2006, ¹2. (in Russian).
  5. Igor Kotenko, Mikhail Stepashkin. Systems - simulators: purpose, functions, architecture and the approach to realization. Journal of Instrument Engineering, Vol.49, ¹3, 2006, P.3-8. (in Russian).
  6. Igor Kotenko, Mikhail Stepashkin, Vitaly Bogdanov. Vulnerability Analysis of Computer Networks on Design Stages and Maintenance. Journal of Instrument Engineering, Vol.49, ¹5, 2006, P.3-8. (in Russian).
  7. Igor Kotenko, Rafael Yusupov. Perspective directions of research in computer security field. Information Security. Inside, ¹2, 2006. P.46-57. (in Russian).
    inside-zi.2-Cover.jpg [image/jpeg] (438236 bytes)
    inside-zi.2-Paper.pdf [application/pdf] (1312129 bytes)
  8. Igor Kotenko, Mikhail Stepashkin. Security metrics for estimating the security level of computer networks on the basis of constructing attack graphs. Information Security. Inside, ¹3, 2006. P.36-45. (in Russian).
    inside-zi.3-Cover.jpg [image/jpeg] (415428 bytes)
    inside-zi.3-Paper.pdf [application/pdf] (1109875 bytes)
  9. Igor Kotenko, Alexander Ulanov. Simulation of "network cats and mice" game: multiagent technologies for research of cyber-counteraction between antagonistic teams of cyber-agents in the Internet. AI News, ¹3, 2006. (in Russian).
  10. Igor Kotenko, Alexander Ulanov. Software testbed and experiments for exploring counteraction of attack and defense agents in the Internet. International Security and Counteracting Terrorism Conference. Moscow.Proceedings. Lomonosov Moscow State University Intellectual Center. 2006. P.80-93. (in Russian).
    ISCTC-06-Cover.jpg [image/jpeg] (87507 bytes)
    ISCTC-06-paper1.pdf [application/pdf] (335656 bytes)
  11. Igor Kotenko, Artem Tishkov, Olga Chervatuk. Architecture and Models for Security Policy Verification. International Security and Counteracting Terrorism Conference. Moscow.Proceedings. Lomonosov Moscow State University Intellectual Center. 2006. P.253-262. (in Russian).
    ISCTC-06-paper2.pdf [application/pdf] (221722 bytes)
  12. Igor Kotenko, Alexander Ulanov. Agent-based Simulation of Distributed Defense against Computer Network Attacks. Proceedings of 20th European Conference on Modelling and Simulation (ECMS 2006). Bonn. Germany. May 28th - 31st, 2006. P.560-565.
    ECMS-06-Cover.jpg [image/jpeg] (496519 bytes)
    ECMS-06-Paper.pdf [application/pdf] (381970 bytes)
  13. Igor Kotenko, Alexander Ulanov. Antagonistic Agents in the Internet: Computer Network Warfare Simulation. The 9th International Conference on Information Fusion. Florence (Italy), 10-13 July, 2006.
    Fusion2006-Paper.pdf [application/pdf] (446339 bytes)
  14. Igor Kotenko, Mikhail Stepashkin. Network Security Evaluation based on Simulation of Malefactor's Behavior. SECRYPT 2006. International Conference on Security and Cryptography. Proceedings. Portugal. 7-10 August 2006. P.339-344.
    Secrypt-06-Cover.jpg [image/jpeg] (339392 bytes)
    Secrypt-06-Paper.pdf [application/pdf] (1171216 bytes)
  15. Igor Kotenko, Alexander Ulanov. Agent-based modeling and simulation of network softbots' competition. Knowledge-Based Software Engineering. Proceedings of the Seventh Joint Conference on Knowledge-Based Software Engineering (JCKBSE'06). Tallinn, Estonia. August 28-31. 2006. IOS Press, 2006. P.243-252.
    JKBSE-06-Cover.jpg [image/jpeg] (429831 bytes)
    JKBSE-06-Paper.pdf [application/pdf] (640629 bytes)
  16. Igor Kotenko, Alexander Ulanov. Simulation of Internet DDoS Attacks and Defense. 9th Information Security Conference. ISC 2006. Samos, Greece. August 30 - September 2, 2006. Proceedings. Lecture Notes in Computer Science, Vol. 4176, 2006. P.327-342.
    ISC-06-Cover.jpg [image/jpeg] (362983 bytes)
    ISC-06-Paper.pdf [application/pdf] (669099 bytes)
  17. Igor Kotenko, Mikhail Stepashkin. Analyzing network security using malefactor action graphs. IJCSNS International Journal of Computer Science and Network Security, Vol.6 No.6, June 2006. P.226-235. ISSN: 1738-7906.
    IJCSNS-06-06-Cover.jpg [image/jpeg] (235118 bytes)
    IJCSNS-06-06-Paper.pdf [application/pdf] (378933 bytes)
  18. Igor Kotenko, Alexander Ulanov. Simulation Environment for Investigation of Cooperative Distributed Attacks and Defense. 9th International Symposium on Recent Advances in Intrusion Detection. RAID 2006. Abstract and Poster sessions. Hamburg, Germany September 20-22, 2006.
    RAID-06-06-Abstract.pdf [application/pdf] (60473 bytes)
    RAID-06-06-Poster.pdf [application/pdf] (1247155 bytes)
  19. Igor Kotenko, Mikhail Stepashkin. Attack Graph based Evaluation of Network Security. The 10th IFIP Conference on Communications and Multimedia Security. CMS'2006. Heraklion, Greece. 19 - 21 October 2006. 2006. Proceedings. Lecture Notes in Computer Science, Vol. 4237, 2006. P.216-227.
    CMS-06-LNCS-4237-Cover.jpg [image/jpeg] (384830 bytes)
    CMS-06-LNCS-4237-Paper.pdf [application/pdf] (429758 bytes)
  20. Igor Kotenko, Alexander Ulanov. Agent Teams in Cyberspace: Security Guards in the Global Internet. International Conference on CYBERWORLDS. CW2006. Lausanne, Switzerland, November 28-30, 2006. Proceedings. IEEE Computer Society, 2006.
  21. Igor Kotenko, Alexander Ulanov. Research of mechanisms of assault and protection in the Internet. ÕV All-Russian Conference “Methods and technical tools of information security” (MTTIS 2006). June 26-28, 2006. St. Petersburg, Proceedings. SPbSPU. P.123. (in Russian).
  22. Igor Kotenko, Artem Tishkov. The approach to construction and realization of information security management system based on security policies in computer networks. ÕV All-Russian Conference “Methods and technical tools of information security” (MTTIS 2006). June 26-28, 2006. St. Petersburg, Proceedings. SPbSPU. P.122. (in Russian).
  23. Mikhail Stepashkin, Igor Kotenko. Technique of the analysis of computer network security based on modelling of the actions of internal and external infringers. ÕV All-Russian Conference “Methods and technical tools of information security” (MTTIS 2006). June 26-28, 2006. St. Petersburg, Proceedings. SPbSPU. P.121. (in Russian).
  24. Vitaly Bogdanov, Igor Kotenko. Proactive monitoring of correct implementation of computer network security policy. ÕV All-Russian Conference “Methods and technical tools of information security” (MTTIS 2006). June 26-28, 2006. St. Petersburg, Proceedings. SPbSPU. P.117. (in Russian).
  25. Igor Kotenko, Mikhail Stepashkin, Vitaly Bogdanov. Evaluation of security level of computer networks on the basis of attack graph construction. Sixth International Scientific School "Modelling and Analysis of Safety and Risk in Complex Systems" (MASR - 2006), St. Petersburg, July 4-8, 2006. P.150-154. (in Russian).
  26. Alexander Ulanov, Igor Kotenko. Research of defense mechanisms against the distributed attacks "Denial of service" on the basis of multiagent simulation. Sixth International Scientific School "Modelling and Analysis of Safety and Risk in Complex Systems" (MASR - 2006), St. Petersburg, July 4-8, 2006. P.333-339. (in Russian).
  27. Vladimir Gorodetsky, Igor Kotenko, Rafael Yusupov. Computer network security. Herald of the Russian Academy of Sciences, ¹ 7, 2006. P.668-670. ISSN: 0869-5873. (in Russian).
  28. Igor Kotenko, Alexander Ulanov. Multi-agent modeling of distributed "Denial of Service" attacks and defense mechanisms. Proceedings of SPIIRAS, Issue 3, Vol.1. St. Petersburg, Nauka, 2006. P.105-125. (in Russian).
  29. Igor Kotenko, Mikhail Stepashkin, Rafael Yusupov. Mathematical Models, Methods and Architectures for Computer Networks Security: the State-of-the-art Review of Perspective Directions of Research by Results of International Workshop MMM-ACNS-2005. Proceedings of SPIIRAS, Issue 3, Vol.2. St. Petersburg, Nauka, 2006. P.11-29. (in Russian).
  30. Igor Kotenko, Mikhail Stepashkin, Vitaly Bogdanov. Evaluating Security of Computer Networks based on Attack Graphs and Qualitative Security Metrics. Proceedings of SPIIRAS, Issue 3, Vol.2. St. Petersburg, Nauka, 2006. P.30-49. (in Russian).
  31. Vitaly Bogdanov, Igor Kotenko. Architecture, models and techniques of functioning of the system of proactive monitoring of security policy. Proceedings of SPIIRAS, Issue 3, Vol.2. St. Petersburg, Nauka, 2006. P.50-69. (in Russian).
  32. Artem Tishkov, Igor Kotenko, Olga Chervatuk, Dmitry Lakomov, Sergey Reznik, Ekaterina Sidelnikova. Conflict Detection and Resolution in Security Policies of Computer Networks. Proceedings of SPIIRAS, Issue 3, Vol.2. St. Petersburg, Nauka, 2006. P.102-114. (in Russian).
  33. Igor Kotenko, Artem Tishkov, Olga Chervatuk, Dmitry Lakomov. Search of conflicts in security policies. Journal of Instrument Engineering, Vol.49, ¹11, 2006. (in Russian).
  34. Igor Kotenko, Alexander Ulanov. Agent-oriented environment for simulation and evaluation of "Distributed Denial of Service" defense mechanisms. Journal of Instrument Engineering, Vol.49, ¹11, 2006 (in Russian).
  35. Igor Kotenko, Alexander Ulanov. Modelling and simulation of counteraction of software agents in the Internet: general approach, simulation environment and experiments. Information Security. Inside, ¹4, 2006, P.44-52; ¹5, 2006, P.48-56. (in Russian).
    inside-zi.4-Cover.jpg [image/jpeg] (453792 bytes)
    inside-zi.4-Paper.pdf [application/pdf] (527867 bytes)
  36. Igor Kotenko, Mikhail Stepashkin. Models of actions of hackers-malefactors realizing distributed multistage attacks. X National Conference on Artificial Intelligence with International Participation(CAI-2006) . Proceedings. Vol. 2. Moscow, Fizmatlit, 2006. P.617-625. ISBN: 5-9221-0757-7. (in Russian).
    inside-zi.5-Cover.jpg [image/jpeg] (410110 bytes)
    inside-zi.5-Paper.pdf [application/pdf] (1110624 bytes)
  37. Igor Kotenko, Alexander Ulanov. Agent-oriented simulation of complex system behavior in Internet. X National Conference on Artificial Intelligence with International Participation(CAI-2006). Proceedings. Vol. 2. Moscow, Fizmatlit, 2006. P.660-668. ISBN: 5-9221-0757-7. (in Russian).
    NCAI-06-A-Kotenko1.pdf [application/pdf] (7392 bytes)
    NCAI-06-Kotenko1.pdf [application/pdf] (412623 bytes)
  38. Mikhail Stepashkin, Igor Kotenko, Vitaly Bogdanov. Intelligent system of computer network security analysis. X National Conference on Artificial Intelligence with International Participation(CAI-2006) . Proceedings. Vol. 2. Moscow, Fizmatlit, 2006. P.149-157. ISBN: 5-9221-0757-7. (in Russian).
    NCAI-06-A-Stepashkin.pdf [application/pdf] (7539 bytes)
    NCAI-06-Cover.jpg [image/jpeg] (261448 bytes)
    NCAI-06-Stepashkin.pdf [application/pdf] (347385 bytes)
  39. Alexander Ulanov, Igor Kotenko. Multi-agent system for simulation of computer network defense mechanisms. X National Conference on Artificial Intelligence with International Participation(CAI-2006) . Proceedings. Vol. 2. Moscow, Fizmatlit, 2006. P.867-876. ISBN: 5-9221-0757-7. (in Russian).
  40. Igor Kotenko, Mikhail Stepashkin, Vitaly Bogdanov. The models and technique of intelligent evaluation of computer networks security level. International Conferences "Intelligent systems (AIS'06)" and "Intelligent CAD (CAD-2006)". Proceedings.Moscow, Fizmatlit, 2006. P.321-328. ISBN: 5-9221-0686-4. (in Russian).
    AIS-06-A-Kotenko1.pdf [application/pdf] (7871 bytes)
    AIS-06-Cover.jpg [image/jpeg] (200919 bytes)
    AIS-06-Kotenko-paper.pdf [application/pdf] (238483 bytes)
  41. Vitaly Bogdanov, Igor Kotenko. Analysis of security policy compliance in computer networks: proactive approach. International Conferences "Intelligent systems (AIS'06)" and "Intelligent CAD (CAD-2006)". Proceedings.Moscow, Fizmatlit, 2006. P.313-320 ISBN: 5-9221-0686-4. (in Russian).
    AIS-06-A-Bogdanov.pdf [application/pdf] (7934 bytes)
    AIS-06-Bogdanov-paper.pdf [application/pdf] (246197 bytes)
  42. Igor Kotenko, Alexander Ulanov. Cooperative agent teamwork in defense from availability violation network attacks.International Conferences "Intelligent systems (AIS'06)" and "Intelligent CAD (CAD-2006)". Proceedings.Moscow, Fizmatlit, 2006. P.306-313. ISBN: 5-9221-0686-4. (in Russian).
    AIS-06-A-Kotenko2.pdf [application/pdf] (7637 bytes)
    AIS-06-Kotenko-paper.pdf [application/pdf] (599294 bytes)
  43. Igor Kotenko, Alexander Ulanov. Teams of agents in cyberspace: modelling and simulation of information protection processes in the global Internet. Problems of management of information society cyber-security. Proceedings of Institute of System Analysis of Russian Academy of Science, URSS, Moscow, 2006. (in Russian).
  44. Igor Kotenko, Alexander Ulanov. Conflicts in the Internet: models of counteraction to distributed cyber attacks. The Firth All-Russian scientific Conference "Mathematics and Security of Information Technologies" (MSIT-06). Moscow, Lomonosov Moscow State University, 2006. (in Russian).
  45. Vitaly Bogdanov, Igor Kotenko, Mikhail Stepashkin. A proactive approach to security policy monitoring in computer networks. The Firth All-Russian scientific Conference "Mathematics and Security of Information Technologies" (MSIT-06). Moscow, Lomonosov Moscow State University, 2006. (in Russian).
  46. Artem Tishkov, Igor Kotenko, Ekaterina Sidelnikova, Olga Chervatuk. Detecting and fixing contradictions in security policies. The Firth All-Russian scientific Conference "Mathematics and Security of Information Technologies" (MSIT-06). Moscow, Lomonosov Moscow State University, 2006. (in Russian).
  47. Mikhail Stepashkin, Igor Kotenko, Vitaly Bogdanov. Computer network security estimation on the basis of attack graphs analysis. The Firth All-Russian scientific Conference "Mathematics and Security of Information Technologies" (MSIT-06). Moscow, Lomonosov Moscow State University, 2006. (in Russian).
  48. Igor Kotenko, Rafael Yusupov. The main directions of scientific research in the field of protection of computer networks and systems. Õ St.Petersburg International Conference "Regional Informatics-2006" (RI-2006). Proceedings. St. Petersburg, October 24-26, 2006. (in Russian).
  49. Victor Vorontsov, Igor Kotenko. Research of approaches to automatic detection and prevention of virus attacks on the basis of the combined mechanisms of network traffic restriction. Õ St.Petersburg International Conference "Regional Informatics-2006" (RI-2006). Proceedings. St. Petersburg, October 24-26, 2006. P.105-106. (in Russian).
  50. Vasily Desnitsky, Igor Kotenko. Protection of the software against breaking: the analysis of methods. Õ St.Petersburg International Conference "Regional Informatics-2006" (RI-2006). Proceedings. St. Petersburg, October 24-26, 2006. P.108-109. (in Russian).

2005

  1. Alexander Ulanov. The use of computer network simulators for modeling the information security processes // IV Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2005)", Saint-Petersburg, June 14-16, 2005. The proceedings of conference - SPb: SPOISU, 2005. P.80-81. (in Russian).
  2. Vladimir Gorodetsky ,Oleg Karsaev , Samoilov V., Alexander Ulanov. Asynchronous alert correlation in multi-agent intrusion detection systems. MMM-ACNS 2005, LNCS 3685,2005. Springer-Verlag Berlin Heidelberg 2005.P.366-379.
  3. Vladimir Gorodetsky, Igor Kotenko. Conceptual Basis of Stochastic Simulation in Internet Environment // Transactions of System Analysis Institute, vol.9, Foundations of Information Technologies and Systems. URSS, Moscow, 2005, P.168-185. (in Russian).
  4. Igor Kotenko. Multiagent models of counteracting malefactors and security systems in the Internet. Mathematics and security of information technologies. Conference proceedings. Moscow, Moscow State University, 2005. P.257-265. (in Russian).
  5. Artem Tishkov, Igor Kotenko. Specification and verifications of security policies of protected computer network: using Event calculus. Mathematics and security of information technologies. Conference proceedings. Moscow, Moscow State University, 2005. P.279-283. (in Russian).
  6. Igor Kotenko. Models of counteracting the agents teams of "Distributed Denial of Service" attacks and protection against them. Intelligent systems. Collective monograph .V.M.Kureichik (ed.). Moscow, Fizmatlit, 2005. P.181-188. (in Russian).
  7. Igor Kotenko, Sergey Nesterov. About the approach to development of functionality of network security scanners. XII All-Russian scientific conference "Problems of information security in the Higher School". MIPI, 2005. P.115-116. (in Russian).
  8. Igor Kotenko, Dmitriy Mihailov. Multiagent technologies in tasks of automated monitoring the information systems of industry enterprises. Science and technologies in industry. ¹1, 2005. (in Russian).
  9. Igor Kotenko. Agent-Based Modeling and Simulation of Cyber-Warfare between Malefactors and Security Agents in Internet. 19th European Simulation Multiconference "Simulation in wider Europe". ESM'05. Riga, Latvia, 1-4 June 2005. P.533-543.
    ECMS2005-Cover.jpg [image/jpeg] (399631 bytes)
    ECMS2005-Paper.pdf [application/pdf] (1013528 bytes)
  10. Igor Kotenko, Alexander Ulanov. Multiagent modeling and simulation of agents' competition for network resources availability. The Fourth International Conference on Autonomous Agents and Multi-Agent Systems. Second International Workshop on Safety and Security in Multiagent Systems (SASEMAS '05). Utrecht, The Netherlands. 2005. P.27-43.
    SASEMAS05-Cover.jpg [image/jpeg] (372878 bytes)
    SASEMAS05-Paper.pdf [application/pdf] (452962 bytes)
  11. Igor Kotenko, Mikhail Stepashkin. Use of deception information systems for protection of information resources of computer networks. Problems of information security. Computer systems. 2005, ¹1, P.63-73. (in Russian).
  12. Rafael Yusupov, Igor Kotenko. Security of computer networks and systems: a state of the art and perspective directions of scientific research. IV St.Petersburg Interregional Conference “Information Security of Russian Regions ("ISRR-2005"). June 14-16, 2005. Proceedings. St.Petersburg, 2005. P.90-91. (in Russian).
  13. Artem Tishkov, Igor Kotenko. Multimodular architecture of security policy verifier. IV St.Petersburg Interregional Conference “Information Security of Russian Regions ("ISRR-2005"). June 14-16, 2005. Proceedings. St.Petersburg, 2005.P.79-80. (in Russian).
  14. Igor Kotenko, Mikhail Stepashkin. Imitation models for security level evaluation of information systems at their design stage.IV St.Petersburg Interregional Conference “Information Security of Russian Regions ("ISRR-2005"). June 14-16, 2005. Proceedings. St.Petersburg, 2005. P.63-64. (in Russian).
  15. Mikhail Stepashkin, Igor Kotenko. The testbed of checking decisions on information protection in computer networks. IV St.Petersburg Interregional Conference “Information Security of Russian Regions ("ISRR-2005"). June 14-16, 2005. Proceedings. St.Petersburg, 2005. P.77-78. (in Russian).
  16. Alexander Ulanov, Igor Kotenko. Modelling of protecting against DDOS attacks on the basis of intelligent agents' teamwork. IV St.Petersburg Interregional Conference “Information Security of Russian Regions ("ISRR-2005"). June 14-16, 2005. Proceedings. St.Petersburg, 2005. P.81-82. (in Russian).
  17. Igor Kotenko, Alexander Ulanov. Agent-oriented modelling and simulation of information protection processes: an antagonism of agents for availability of computer networks resources. International Conferences "Artificial Intelligence Systems" (IEEE AIS'05)" and "Intelligent CAD" (CAD-2005). Divnomorskoe, September 3-10, 2005, Proceedings.Ģoscow, Fizmatlit, 2005. Vol.1. P.296-301. (in Russian).
  18. Igor Kotenko, Mikhail Stepashkin. Intelligent system for analyzing computer networks security at various stages of life cycle. International Conferences "Artificial Intelligence Systems" (IEEE AIS'05)" and "Intelligent CAD" (CAD-2005).Proceedings. Ģoscow, Fizmatlit, 2005. Vol.1. P.231-237. (in Russian).
  19. Igor Kotenko, Alexander Ulanov. Teamwork Approach for Modeling and Simulation of DDOS attacks in Internet. 6th Workshop on Agent-Based Simulation. ABS6. Erlangen. Germany. September 12-15, 2005. P.28-33.
  20. Igor Kotenko, Mikhail Stepashkin. Analyzing Vulnerabilities and Measuring Security Level at Design and Exploitation Stages of Computer Network Life Cycle. Lecture Notes in Computer Science, Springer-Verlag, V.3685. The Third International Workshop "Mathematical Methods, Models and Architectures for Computer Networks Security" (MMM-ACNS-05). September 24-28, 2005, St. Petersburg, Russia. P. 317-330.
  21. Artem Tishkov, Igor Kotenko, Ekaterina Sidelnikova. Security Checker Architecture for Policy-based Security Management. Lecture Notes in Computer Science, Springer-Verlag, V.3685. The Third International Workshop "Mathematical Methods, Models and Architectures for Computer Networks Security" (MMM-ACNS-05). September 24-28, 2005, St. Petersburg, Russia. P.469-474.
  22. Vitaliy Bogdanov, Igor Kotenko, Mikhail Stepashkin. The active security analysis of computer networks. ÕIV All-Russian scientific and technical conference "Methods and tools of information assurance". October 4-6, 2005. St. Petersburg, Proceedings .SPbSPU. 2005. P.95. (in Russian).
  23. Igor Kotenko, Alexander Ulanov The software environment for simulation of protection mechanisms against distributed attacks "Denial of Service".ÕIV All-Russian scientific and technical conference "Methods and tools of information assurance". October 4-6, 2005. St. Petersburg, Proceedings .SPbSPU. 2005. P.96. (in Russian).
  24. Mikhail Stepashkin, Vitaliy Bogdanov, Igor Kotenko. Subsystem of the passive analysis of computer networks security. ÕIV All-Russian scientific and technical conference "Methods and tools of information assurance". October 4-6, 2005. St. Petersburg, Proceedings .SPbSPU. 2005. P.100. (in Russian).
  25. Artem Tishkov, Igor Kotenko. Verification of security policies in computer systems. ÕIV All-Russian scientific and technical conference "Methods and tools of information assurance". October 4-6, 2005. St. Petersburg, Proceedings .SPbSPU. 2005. P.101. (in Russian).
  26. Mikhail Stepashkin, Igor Kotenko, Vitaliy Bogdanov. Imitation of attacks for the active vulnerabilities analysis of computer networks. The second All-Russian scientific-practical conference on imitation modelling and its application in science and industry "Imitation modelling. Theory and practice". IMMOD-2005. Proceedings. Vol.1. St.Petersburg, October 19-21, 2005. P.269-273. (in Russian).
  27. Igor Kotenko, Alexander Ulanov. Multiagent environment for simulating the mechanisms of protection against distributed computer attacks. The second All-Russian scientific-practical conference on imitation modelling and its application in science and industry "Imitation modelling. Theory and practice". IMMOD-2005. Proceedings. Vol.1. St.Petersburg, October 19-21, 2005. P.220-224. (in Russian).
  28. Olga Chervatuk, Artem Tishkov, Igor Kotenko. Verification by model checking in the task of dynamic detection of conflicts in security policy. The second All-Russian scientific-practical conference on imitation modelling and its application in science and industry "Imitation modelling. Theory and practice". IMMOD-2005. Proceedings. Vol.1. St.Petersburg, October 19-21, 2005. P.283-287. (in Russian).
  29. Igor Kotenko, Alexander Ulanov. Agent-based simulation of DDOS attacks and defense mechanisms. Journal of Computing, Vol. 4, Issue 2, 2005.
    Computing-05-Vol.4-Issue-2-Cover.jpg [image/jpeg] (510237 bytes)
    Computing-05-Vol.4-Issue-2-Paper.pdf [application/pdf] (583575 bytes)
  30. Igor Kotenko, Alexander Ulanov. Software testbed and experiments for exploring counteraction of attack and defense agents in the Internet. Forth All-Russian conference "Mathematics and security of information technologies" (MaBIT-05). Moscow, Moscow State University, November 2-3, 2005. (in Russian).
  31. Igor Kotenko, Artem Tishkov, Olga Chervatuk. Architecture and models for security policy verification. Forth All-Russian conference "Mathematics and security of information technologies" (MaBIT-05). Moscow, Moscow State University, November 2-3, 2005. (in Russian).
  32. Vladimir Gorodetski, Igor Kotenko, Viktor Skormin (Editors). Computer Network Security. Lecture Notes in Computer Science, Vol.3685, Springer Verlag, 2005.
  33. Igor Kotenko, Alexander Ulanov. The Software Environment for multi-agent Simulation of Defense Mechanisms against DDoS Attacks. The International Conference on Intelligent Agents, Web Technologies and Internet Commerce - IAWTIC'2005. Vienna - Austria, November 28 - 30, 2005.
  34. Igor Kotenko, Artem Tishkov, Dmitriy Lakomov, Olga Chervatuk, Ekaterina Sidelnikova. Checking correctness of security policies. IV Inter-regional Conference "Information Security of Russia Regions". Selected papers proceedings. St.Petersburg, 2005. (in Russian).
  35. Igor Kotenko, Mikhail Stepashkin, Vitaliy Bogdanov. Model of attacks for imitating malefactor's actions in security analysis system for computer networks. IV Inter-regional Conference "Information Security of Russia Regions". Selected papers proceedings. St.Petersburg, 2005. (in Russian).
  36. Igor Kotenko, Rafael Yusupov. Computer security: the perspective directions of SPIIRAS research. IV Inter-regional Conference "Information Security of Russia Regions". Selected papers proceedings. St.Petersburg, 2005. (in Russian).
  37. Igor Kotenko. Multi-agent modeling and simulation of computer network security processes: "a game of network cats and mice". NATO Advanced Study Institute (ASI). "Network Security and Intrusion Detection". October 1-12, 2005. Nork, Yerevan, Armenia, IOS Press. 2005.
  38. Vladimir Platonov, Andrey Chechulin. Defending against network and transport layers attacks. IV Interregional Conference "Information Security of Russia Regions". Selected papers proceedings. St.Petersburg, 2005. P.114-115. (in Russian).
  39. Philipp Nesteruk ,Gennadiy Nesteruk, Alexander Kharchenko. Adaptive systems of information protection for electronic business // Information technology in business: Proc. of the 2-nd Int. Conf. 4 –17 June, 2005, P.113–123

2004

  1. Alexander Ulanov, Sergey Nesterov. The risk management method in information security domain based on the game theory. Polytechnic Sympozium. 2004.P.23-99. (in Russian).
  2. Igor Kotenko. Multiagent technologies of vulnerability assessment and intrusion detection in computer networks. Confident, ¹ 2, P.72-76; ¹ 3, P.78-82. 2004. (in Russian).
    Confident-2-2004-Cover.jpg [image/jpeg] (203883 bytes)
    Confident-2-2004-Paper.pdf [application/pdf] (536500 bytes)
    Confident-3-2004-Cover.jpg [image/jpeg] (196652 bytes)
    Confident-3-2004-Paper.pdf [application/pdf] (488448 bytes)
  3. Igor Kotenko. Theoretical aspects of developing deception systems. III Inter-regional Conference "Information Security of Russia Regions". Proceedings. St.Petersburg. 2004. P.59-68. (in Russian).
  4. Igor Kotenko, Mikhail Stepashkin. The prototype of deception system simulator: architecture and scripts of carrying out of experiments. III Inter-regional Conference "Information Security of Russia Regions". Proceedings. St.Petersburg. 2004. P.68-73. (in Russian).
  5. Alexander Ulanov, Igor Kotenko. Modeling attack "Distributed Denial of Service" by an example of using virus Mydoom. IX International Conference "Regional informatics-2004", St. Petersburg, Proceedings. SPb., 2004. P.155-156. (in Russian).
  6. Mikhail Stepashkin, Igor Kotenko. Analysis of attributes of network connections and operational system logs for intrusion detection. IX International Conference "Regional informatics-2004", St. Petersburg, Proceedings. SPb., 2004. P.152-153. (in Russian).
  7. Igor Kotenko, Mikhail Stepashkin. Monitoring of users work in computer networks. IX International Conference "Regional informatics-2004", St. Petersburg, Proceedings. SPb., 2004. P.136-137. (in Russian).
  8. Igor Kotenko, Mikhail Stepashkin. Deception systems for protection of information resources in computer networks. Proceedings of SPIIRAS, Issue 2. SPb., SPIIRAS, 2004 (in Russian).
  9. Vladimir Gorodetski, Oleg Karsayev, Igor Kotenko, V.Samoilov. Multi-Agent Information Fusion: Methodology, Architecture and Software Tool for Learning of Object and Situation Assessment. The 7th International Conference on Information Fusion. Proceedings. Stockholm, Sweden. June 28 - July 1, 2004.
    fusion-04-paper.pdf [application/pdf] (451039 bytes)
  10. Pavel Laskov, Christin Schafer, Igor Kotenko. Intrusion detection in unlabeled data with one-class Support Vector Machines. Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2004), Lecture Notes in Informatics (LNI), No. 46, Dortmund, Germany, July 2004. P.71-82.
    DIMVA-04-Cover.jpg [image/jpeg] (781850 bytes)
    DIMVA-04-paper.pdf [application/pdf] (215790 bytes)
  11. Igor Kotenko, Mikhail Stepashkin. Intelligent deception systems for information security in computer networks. International Conferences "Artificial Intelligence Systems" (IEEE AIS'04)" and "Intelligent CAD" (CAD-2004). Proceedings. Divnomorskoe, September 3-10, 2004. P.204-209. (in Russian).
  12. Igor Kotenko. Recognition of agents-hackers plans at detecting computer attacks. International Conferences "Artificial Intelligence Systems" (IEEE AIS'04)" and "Intelligent CAD" (CAD-2004). Proceedings .Divnomorskoe, September 3-10, 2004. P.198-204. (in Russian).
  13. Igor Kotenko, ArtemTishkov, M.Tishkova. The event calculus implementation using ILOG JRules for security policy verification. 9-th International Workshop SPEECH AND COMPUTER (SPECOM'2004) 20-22 September 2004, St. Petersburg, Russia. 2004. P.630-633.
  14. Igor Kotenko. Mutiagent technologies of vulnerability assessment and intrusion detection in computer networks. AI News, ¹ 1, 2004. P.56-72. (in Russian).
  15. Igor Kotenko. Modeling and Simulation of Attacks for Verification of Security Policy and Vulnerability Assessment. Seventh International Symposium on Recent Advances in Intrusion Detection. RAID 2004. Abstract and Poster sessions. Sophia-Antipolis, French Riviera, France, September 15-17, 2004.
  16. Igor Kotenko. Mutiagent modeling of attack "Distributed Denial of Service". IX National Conference on Artificial Intelligence with international participation. Proceedings. Vol.2. Ģoscow: Fizmatlit, 2004. P.723-731. (in Russian).
  17. Vladimir Gorodetsky, Igor Kotenko. Scenarios Knowledge base: A Formal Framework for Proactive Coordination of Coalition Operations. Knowledge Systems for Coalition Operation. M.Pechoucek, A.Tate (eds.). Third International Conference on Knowledge Systems for Coalition Operations (KSCO-2004). Pensacola, Florida. 2004. P.83-97.
    KSCO-04-Cover.jpg [image/jpeg] (142459 bytes)
    KSCO-04-Paper.pdf [application/pdf] (278320 bytes)
  18. Artem Tishkov, Igor Kotenko System of security policies verification in protected computer networks.ÕII Russian Conference "Methods and tools of information assurance". St. Petersburg, Proceedings.SPbSPU. October 4-5, 2004. P.129. (in Russian).
  19. Igor Kotenko, Mikhail Stepashkin, Dmitriy Mihailov. System of collection, analysis and storage of data for users work audit. ÕII Russian Conference "Methods and tools of information assurance". St. Petersburg, Proceedings.SPbSPU. October 4-5, 2004.P.124. (in Russian).
  20. Igor Kotenko, Mikhail Stepashkin. Recognition of goals and plans of malefactors at detecting computer attacks. ÕII Russian Conference "Methods and tools of information assurance". St. Petersburg, SPbSPU. October 4-5, Proceedings. 2004. P.97. (in Russian).
  21. Alexander Ulanov, Igor Kotenko. Models of DDoS-attacks and mechanisms of protection against them. ÕII Russian Conference "Methods and tools of information assurance". St. Petersburg, Proceedings.SPbSPU. October 4-5, 2004. P.106. (in Russian).
  22. Igor Kotenko. Multiagent models of counteracting malefactors and security systems in Internet. Third All-Russian Conference "Mathematics and security of information technologies". Moscow, Moscow State University, 2004. (in Russian).
  23. Igor Kotenko, Artem Tishkov. Event calculus for specification and verifications of security policies of protected computer network. Third All-Russian Conference "Mathematics and security of information technologies". Moscow, Moscow State University, 2004. (in Russian).
  24. Pavel Laskov, Christin Schafer, Igor Kotenko, Klaus-Robert Muller Intrusion detection in unlabeled data with quarter-sphere Support Vector Machines. PIK-Heft. Germany. 2004.
  25. Igor Kotenko. Modeling cyber war: models of teams of attack and protection agents acting in Internet. Applied intelligent systems. Ģoscow, Fizmatlit, 2004 (in Russian).

2003

  1. Alexander Ulanov, Sergey Nesterov. Development of method for information defense system effectiveness analysis based on trench games theory. Polytechnic Sympozium. Proceedings. Saint-Petersburg, 2003. P.14-15 (In Russian and English)
  2. Sergey Nesterov, Alexander Ulanov. Development of risk analysis method in information security domain based on trench games theory. XVI international scientific-methodical conference.Mathematics in VUZ. Proceedings .Petrozavodsk, 2003. P.171-173. (In Russian)
  3. Vladimir Gorodetsky, Igor Kotenko, Oleg Karsaev. Multi-agent Technologies for Computer Network Security: Attack Simulation, Intrusion Detection and Intrusion Detection Learning. International Journal of Computer Systems Science and Engineering. vol.18, ¹4, July 2003, P.191-200.
    ICSSE-2003-paper.pdf [application/pdf] (1871467 bytes)
  4. Igor Kotenko. Multi-agent technologies of active vulnerabilities analysis and intrusion detection for creating secure distributed computer systems. Proceedings of International Congress "Trust and č safety in informational society", St. Petersburg, April 21-22, 2003. (in Russian).
  5. Igor Kotenko, Evgeniy Man'kov. Agent-Based Modeling and Simulation of Computer Network Attacks. Proceedings of Fourth International Workshop "Agent-Based Simulation 4 (ABS 4)". Jean-Pierre Muller, Martina-M.Seidel (Editors). April 28-3. Montpellier, France, 2003, P.121-126.
  6. Igor Kotenko. Teamwork of Hackers-Agents: Modeling and Simulation of Coordinated Distributed Attacks on Computer Networks. Proceedings of the 3rd International Central and Eastern European Conference on Multi-Agent Systems (CEEMAS 2003). Prague, Czech Republic. June 16-18, 2003. "Multi-Agent Systems and Applications III". V.Marik, J.Muller, M.Pechoucek (Editors), Lecture Notes in Artificial Intelligence, Springer-Verlag, vol.2691, P.464-474.
  7. Vladimir Gorodetsky, Igor Kotenko, J.B.Michael. Multi-agent Modeling and Simulation of Distributed Denial of Service Attacks on Computer Networks. Proceedings of Third International Conference "NAVY AND SHIPBUILDING NOWADAYS" (NSN'2003). St. Petersburg, Russia, June 26-28, 2003. P.38-47.
  8. A.Alexeev, Igor Kotenko. Teamwork of agents protecting from distributed attacks "Denial of service". Proceedings of International Conference on Soft Computing and Measurements (SMC'2003). St-Petersburg, Russia. June 25 - 27, 2003, P.294-297. (in Russian).
  9. Igor Kotenko, Mikhail Stepashkin. Intelligent system for simulating attacks on Web-server for computer systems vulnerabilities analysis. Proceedings of International Conference on Soft Computing and Measurements (SMC'2003). St. Petersburg, Russia, June 25 - 27, 2003, P.298-301. (in Russian).
  10. Igor Kotenko, Leonid Stankevich. Real-time Teamwork of Agents. AI News, ¹ 3, 2003. P.25-31. (in Russian).
  11. Igor Kotenko. Models of Opposition of Agents Teams in realizing of and protecting from distributed attacks "Denial of service".International Conferences "Artificial Intelligence Systems" (IEEE AIS'03)" and "Intelligent CAD" (CAD-2003).Proceedings. Divnomorskoe, September 3-10, 2003. Vol.1. P.422-428. (in Russian).
  12. Sergey Nesterov, Igor Kotenko. Risk analysis of computer systems on the basis of using network attack simulator. VIII International Conference "Regional informatics-2002".Proceedings, St. Petersburg, 2003. P.185-189. (in Russian).
  13. I.Kotenko, A.Alexeev. Modeling of DDoS-attacks on the basis of agents' teamwork. Proceedings of the VIII International Conference "Regional informatics-2002". St. Petersburg, 2003. P.180-184. (in Russian).
  14. Igor Kotenko, Sergey Nesterov. Information assurance systems design by integrating the procedures of risk analysis and active security audit. International Conference "Modeling and Analysis of Safety and Risk in Complex Systems" (MA SR - 2003). St. Petersburg, August 20-23, 2003. P.396-402. (in Russian).
  15. Igor Kotenko, Evgeny Man'kov. Experiments with simulation of attacks against computer networks. Lecture Notes in Computer Science, Springer-Verlag, Vol.2776. Theory and Practice of Computer Network Security. Proceedings of the International Workshop on Mathematical Methods, Models and Architectures for Computer Network Security, St. Petersburg, Russia, September 21-23, 2003, P.187-198.
  16. Igor Kotenko, Alexey Alexeev, Evgeny Man'kov. Formal Framework for Modeling and Simulation of DDoS Attacks Based on Teamwork of Hackers-Agent. Proceedings of 2003 IEEE/WIC International Conference on Intelligent Agent Technology, Halifax, Canada, October 13-16, 2003, IEEE Computer Society. 2003, P.507-510.
  17. Igor Kotenko. Active Assessment of Computer Networks Vulnerability by Simulation of Complex Remote Attacks. Proceedings of 2003 International Conference on Computer Networks and Mobile Computing (ICCNMC-03). Shanghai, China, October 20-23, 2003. IEEE Computer Society, 2003, P.40-47.
  18. Vladimir Gorodetsky, Oleg Karsaev, Igor Kotenko, V.Samoilov, Mikhail Stepashkin. Multi-agent system of intrusion detection learning. III Inter-regional Conference "Information Security of Russia Regions", Proceedings. Vol.1. St. Petersburg, November 25-27, 2003.P.118. (in Russian).
  19. Dmitriy Komashinski, Igor Kotenko. Multi-agent technology for modeling of virus expansion within Internet. III Inter-regional Conference "Information Security of Russia Regions". Proceedings.Vol.1. St. Petersburg, November 25-27, 2003. P.127-128 (in Russian).
  20. Igor Kotenko. Modeling of cyber war on the basis of agents' technologies.III Inter-regional Conference "Information Security of Russia Regions",Proceedings. Vol.1. St. Petersburg, November 25-27, 2003.P.70-71 (in Russian).
  21. Alexey Alexeev, Igor Kotenko. Multi-agent system of DDOS-attacks simulation. ÕI Russian Conference "Methods and tools of information assurance".Proceedings. St. Petersburg, SPbSPU, November 26-27, 2003.P.101-102. (in Russian).
  22. Igor Kotenko, Mikhail Stepashkin. Prototype of honeypot system. ÕI Russian Conference "Methods and tools of information assurance".Proceedings. St. Petersburg, SPbSPU,. November 26-27, 2003.P.57-58. (in Russian).
  23. Igor Kotenko, Evgeny Man'kov. Stochastic model of attacks on computer networks based on state machines. Informatization and communication, ¹ 1-2, 2003. P.61-67. (in Russian).
  24. Igor Kotenko, Vladimir Gorodetski. Multi-agent Systems for Intrusion Detection. Proceedings of China-Russia Bilateral Conference on Intelligent Information Processing (CRBCIIP-2003), October 19-23, 2003, Shanghai, China. P.9-17.
  25. Igor Kotenko. Multi-agent Modeling and Simulation of Computer Network Attacks based on Teamwork Models and Formal Grammars. Proceedings of China-Russia Bilateral Conference on Intelligent Information Processing (CRBCIIP-2003), October 19-23, 2003, Shanghai, China. P.18-29.
  26. Andrey Ogarok, Dmitriy Komashinski, Shkolnikov D.K., Martynenko V.V. Virtual wars. Artificial intelligence defends against malware .Confident , 2003, ¹ 2, P.64-69. (in Russian).
  27. Alexander Rostovtsev, Elena Makhovenko, Alexander Filippov, Andrey Chechulin. On the strength of GOST 28147-89 // Information security problems. Computer systems 2003. ¹2 P.75-83 (in Russian).
  28. Philipp Nesteruk, Gennady Nesteruk, Alexander Kharchenko. Information safety in electronic business: adaptive model of systems safety of information technologies // St. Petersburg, 2003. Information technology in business: Proc. of the Int. Conf. October 8 -10, 2003.

2002

  1. Alexander Ulanov. Risk analysis in the domain of computer security. Contest-conference of students works in the domain of modern programming technology of Microsoft company. Proceedings Saint-Petersburg, 2002. P.92-93. (in Russian).
  2. Alexander Ulanov, Sergey Nesterov. The elaboration of risk analysis method in information safety sphere. Polytechnic Sympozium. Proceedings Saint-Petersburg, 2002. P.70. (in Russian).
  3. Vladimir Gorodetsky, Igor Kotenko, Oleg Karsaev, Aleksey Khabalov. Software Development Kit for Multi-agent Systems Design and Implementation. Lecture Notes in Artificial Intelligence, Vol.2296, Springer Verlag, 2002. P.121-130.
  4. Vladimir Gorodetski, Igor Kotenko. Formal Model of complex distributed attacks on Computer Networks. II Inter-regional Conference "Information Security of Russia Regions". Proceedings. Vol.2. Saint-Petersburg, 2002. P.92-97. (in Russian).
  5. Vladimir Gorodetski, Igor Kotenko. Teamwork of Agents in Antagonistic Environment. International Conference on Soft Computing and Measurements. SMC'2002. Proceedings. Saint-Petersburg, 2002. Vol.1. P.259-262. (in Russian).
  6. Igor Kotenko, Oleg Karsayev, V.V.Samoilov. Ontology of learning for Intrusion Detection in Computer Networks. International Conference on Soft Computing and Measurements. SMC'2002. Proceedings. Saint-Petersburg, 2002. Vol.1. P.255-258. (in Russian).
  7. Vladimir Gorodetski, Igor Kotenko.The Multi-agent Systems for Computer Network Security Assurance: frameworks and case studies. IEEE International Conference on Artificial Intelligence Systems (IEEE ICAIS-02). Proceedings. 2002. P.297-302.
    ICAIS-02-paper.pdf [application/pdf] (177148 bytes)
  8. Igor Kotenko, Leonid Stankevich. The Control of Teams of Autonomous Objects in the Time-Constrained Environments. IEEE International Conference on Artificial Intelligence Systems (IEEE ICAIS-02). Proceedings. 2002. P.121-130.
  9. Igor Kotenko, Evgeniy Man'kov. Simulation of Attacks on Telecommunication Systems. VIII International Conference on Informational Networks, Systems and Technologies. ICINSAT-2002. SUT. St.Petersburg, 2002. P.190-198. (in Russian).
  10. Igor Kotenko. Multi-agent Technologies for Support of Intrusion Detection in Computer Networks. Õ Russian Conference "Methods and tools of information assurance". Proceedings. Saint-Petersburg - Pushkin,2002.P.44-45. (in Russian).
  11. Vladimir Gorodetski, Igor Kotenko. Teamwork of Hackers-Agents: Application of Multiagent Technology for Simulation of Distributed Attacks on Computer Networks. VIII National conference with international involvement on Artificial Intelligence Proceedings. Moscow, 2002. P.711-720. (in Russian).
  12. Igor Kotenko, Nikolay Lihvanzev. The Technology of Expert Critics for Intelligent Support of Decision Making. VIII National conference with international involvement on Artificial Intelligence(CAI-2002). Proceedings. Moscow, 2002. P.565-574. (in Russian).
  13. Igor Kotenko, Leonid Stankevich. Agents' Teamwork in Conditions of Time Constraints. Third International Conference "Artificial Intelligence -2002". Proceedings . 2002. Crimea, Ukraine, 2002.P.249-253 (in Russian).
  14. Igor Kotenko.Case-based Recovering of Formal Grammars specifying Scenarios of Computer Attacks. Third International Conference "Artificial Intelligence -2002". Proceedings. 2002. Crimea, Ukraine, 2002. (in Russian).
  15. Vladimir Gorodetski, Igor Kotenko. Attacks against Computer Network: Formal Grammar-based Framework and Simulation Tool. Lecture Notes in Computer Science, V.2516. Recent Advances in Intrusion Detection. A.Wespi, G.Vigna, L.Deri (Eds.). Fifth International Symposium. RAID 2002. Zurich, Switzerland. October 2002. Proceedings. P.219-238.
    RAID-02-paper.pdf [application/pdf] (137246 bytes)
  16. Igor Kotenko. Taxonomies of attacks on computer systems. SPIIRAS Proceeding, Vol.1. SPb, SPIIRAS, 2002. P.196-211. (in Russian).
  17. Andrey Ogarok, Vladimir Nasypny, Dmitriy Komashinskiy. Technology of intelligence antivirus scanning of dangerous software routines. Magazine “Innovations”, 2002, ¹9,10. P.128-131. (in Russian).

2001

  1. Igor Kotenko, Oleg Karsayev. Application of Multi-agent Technology for Integrated Assurance of Computer Networks. Transactions of Taganrog Radio-Technical University, ¹4, 2001. P.38-50. (in Russian).
  2. Igor Kotenko, Nikolay Lihvanzev. Multi-agent Technology of Expert Critics for Intelligent Decision Support. Transactions of Taganrog Radio-Technical University, ¹4, 2001. P.17-25. (in Russian).
  3. Vladimir Gorodetski, Igor Kotenko. Models of Attacks on Computer Networks based on Formal Grammars. International Conference on Soft Computing and Measurements. SMC'2001. Proceedings. Saint-Petersburg, 2001. Vol.1. P.212-216. (in Russian).
  4. Nikolay Lihvanzev, Igor Kotenko. Model of Self-adaptation of Expert Critics Components based on Probabilistic State Machines. International Conference on Soft Computing and Measurements. SMC'2001. Proceedings. Saint-Petersburg, 2001. Vol.1. P.131-136. (in Russian).
  5. Vladimir Gorodetski, Oleg Karsayev, Igor Kotenko. Program prototype of the Multi-Agent Computer Network Intrusion Detection System. CAI'2001. International Congress "Artificial Intelligence in XXI Century". Proceedings. Vol.1. 2001. P.280-293. (in Russian).
  6. Vladimir Gorodetski, Oleg Karsayev, Igor Kotenko, Aleksey Khabalov. MAS DK: Software Development Kit for Multi-agent Systems Implementation and Examples of Applications. ICAI'2001. International Congress "Artificial Intelligence in XXI Century". Proceedings. Vol.1. 2001. P.249-262. (in Russian).
  7. Vladimir Gorodetsky, Oleg Karsayev, Aleksey Khabalov, Igor Kotenko, Jeffrey Popyack, Viktor Skormin. Agent-based Model of Computer Network Security System: A Case Study. Lecture Notes in Computer Science, V.2052. Information Assurance in Computer Networks. Methods, Models, and Architectures for Network Security. International Workshop MMM-ACNS 2001. St.Petersburg, Russia, May 2001. Proceedings. P.39-50.
  8. Vladimir Gorodetsky, Oleg Karsayev, Igor Kotenko, Aleksey Khabalov. Software Development Kit for Multi-agent Systems Design and Implementation. Proceedings of the Second International Workshop of Central and Eastern Europe on Multi-agent Systems. CEEMAS'01. Krakow, Poland, September 26-29, 2001. B.Dunin-Keplicz, E.Nawarecki (Eds.). 2001. P.99-108.
  9. V.Gorodetski, O.Karsayev, I.Kotenko . Multi-agent System of Intrusion Detection into Computer Networks. II Inter-regional Conference "Information Security of Russia Regions " . Proceedings. Vol.1. Saint-Petersburg, 2001. P.56. (in Russian).
  10. V.Gorodetski, I.Kotenko, E,Man'kov. Modeling of distributed Attacks on Computer Networks. II Inter-regional Conference "Information Security of Russia Regions " . Proceedings. Vol.1. Saint-Petersburg, 2001. P.56-57. (in Russian).

2000

  1. Vladimir Gorodetsky, Igor Kotenko, Jeffrey Popyack, Viktor Skormin. Integrated Multi-Agent Information Security System: Mechanisms of Agents' Operation and Learning. Proceedings of the Fifth International Conference on the Practical Application of Intelligent Agents and Multi-Agent Technology. PAAM' 2000. PA EXPO 2000. Manchester. UK. Practical Application Company Ltd. 2000. P.151-154.
  2. Vladimir Gorodetski, Igor Kotenko, Oleg Karsaev. Framework for Ontology-based Representation of Distributed Knowledge in Multiagent Network Security System. Proceedings of the 4th World Multi-conference on Systems, Cybernetics and Informatics (SCI-2000), Vol. III: "Virtual Engineering and Emergent Computing". Orlando, USA, July 2000. P.52-58.
  3. Vladimir Gorodetsky, Igor Kotenko, Viktor Skormin. Integrated Multi-Agent Approach to Network Security Assurance: Models of Agents' Community. Information Security for Global Information Infrastructures. IFIP TC11 Sixteenth Annual Working Conference on Information Security. Ed. by S.Qing, J.H.P.Eloff. Beijing, China, August 21-25, 2000. P.291-300.
  4. Vladimir Gorodetsky, Igor Kotenko, Oleg Karsaev. Multi-Agent Information Security System in Computer Networks: Mechanisms of Learning and Decision Making for Intrusion Detection. Inter-regional Conference "Information Security of Russia Regions". Proceedings. Saint-Petersburg, 2000. P.97-104. (in Russian).
  5. Vladimir Gorodetski, Igor Kotenko, Oleg Karsaev. Multi-agent Network Security System: Mechanisms of Learning and Decision Making for Intrusion Detection. "Problemy Informatizatsiy", ¹2, 2000. P.67-73. (in Russian).
  6. Igor Kotenko. Models and algorithms of the guaranteed time support for problem solving by knowledge-based systems. International Conference on Soft Computing and Measurements. SMC'2000. Proceedings. Saint-Petersburg, 2000. P.254-257. (in Russian).
  7. Igor Kotenko, V.Golodnov, N.Lihvanzev, M.Zabadani. New Information Technologies for Decision Support Systems in design and Planning of Telecommunication Systems. VI International Conference on Informational Networks and Systems. ISINAS-2000. LONIIS, SUT. St.Petersburg, 2000. P.135-146. (in Russian).
  8. Vladimir Gorodetsky, Igor Kotenko, Oleg Karsaev, Aleksey Khabalov. Multi-agent Technologies of Integrated Assurance in Telecommunication Networks. VI International Conference on Informational Networks and Systems. ISINAS-2000. LONIIS, SUT. St.Petersburg, 2000. P.122-134. (in Russian).
  9. Vladimir Gorodetsky, Igor Kotenko, Oleg Karsaev. Intelligent Agents for Attack Detection in Computer Networks. CAI'2000. VII National conference with international involvement on Artificial Intelligence Proceedings. Moscow, 2000. P.771-779. (in Russian).

1999

  1. Igor Kotenko. Uncertainty Processing for Monitoring Large-Scaled Distributed Systems // Ģåęäóķąšīäķą˙ źīķōåšåķöč˙ ļī ģ˙ćźčģ āū÷čńėåķč˙ģ č čēģåšåķč˙ģ. SMC-99. Ńįīšķčź äīźėąäīā. ŃĻį: ŃĻįĆŻŅÓ, 1999, Vol.1 P.89-93
  2. Igor Kotenko. Application of Hybrid Agent-Based Technology for Design of Telecommunication Systems // Proceedings of the First International Workshop of Central and Eastern Europe on Multi-agent Systems. CEEMAS'99. St. Petersburg,1999. P.139-153.
  3. Vladimir Gorodetsky,Igor Kotenko,Jeffrey Popyack,Victor Skormin . Agent-based Model of Information Security System: Architecture and Formal Framework for Coordinated Behavior Specification // Proceedings of the First International Workshop of Central and Eastern Europe on Multi-agent Systems. CEEMAS'99. St. Petersburg.1999. P.113-123.
  4. Vladimir Gorodetsky,Igor Kotenko,Jeffrey Popyack,Victor Skormin. Ontology-Based Multi-Agent Model of an Information Security System // Lecture Notes in Artificial Intelligence, V.1711. New Directions in Rough Sets, Data Mining, and Granular-Soft Computing. 7th International Workshop, RSFDGrC'99. Yamaguchi, Japan. November 1999. Proceedings. P.528-532.
  5. Vladimir Gorodetsky ,Igor Kotenko, Jeffrey Popyack, Victor Skormin. Multi-Agent Integrated Information Security System for Computer Networks: Architecture and Agent Interaction // Proceedings of the Second International Scientific Conference in the Republic of Kazakhstan on Informative Technologies and Control (KazITC'99). December 6-10, 1999. Almaty, Kazakhstan. P.286-305.

Top 

RUSSIA, 199178, Saint-Petersburg, liniya 14-ya, 39, SPIIRAS (metro station Vasileostrovskaya).
+7-(812)-328-7181, +7-(812)-328-2642, ivkote[AT]comsec[DOT]spb[DOT]ru

Comments? Questions? chechulin[AT]comsec[DOT]spb[DOT]ru

Locations of visitors to this page