| News | Staff | Projects | Awards | Patents | Results | Conferences | Collaboration | Publications | Events | Matherials | Links |
 | Contacts |
rus | eng |
  


Personal | Interests |  Membership | Activities |  Awards |  Patents and Programms |  Projects | Publications | Identifiers | 

Chechulin Andrey Alexeevich

Citizenship: Russia
Address academic (office):
St.Petersburg Institute for Informatics and Automation of the Russian Academy of Sciences
39, 14th Liniya, St.-Petersburg, 199178, Russia
Tel.: +7-(812)-328-7181
Fax: +7-(812)-328-4450

Position:Senior research fellow

Andrey Alexeevich Chechulin, senior research fellow of Laboratory of Computer Security Problems of the St. Petersburg Institute for Informatics and Automation of the Russian Academy of Science (Scientific advisor - prof. Igor Kotenko).

E-mail: chechulin[AT]comsec[DOT]spb[DOT]ru
http://comsec.spb.ru/chechulin/

Top 

Research interests

Computer network security, intrusion detection, analysis of vulnerability, security visualization, embedded systems security

Top 

Academic background

  • 1997-1999 the Saint-Petersburg Physico-Mathematical Lyceum (FML) ¹239
  • 1999-2005 the St.-Petersburg State Polytechnical University, Faculty of Technical Cybernetics, faculty "Information Safety of Computer Networks"
  • 2003 the degree of the bachelor in a direction "Computer science and computer facilities" is appropriated.
  • 2005 the degree of the master in a direction "Computer science and computer facilities", specialization - 552825 "Safety and protection of the information" is appropriated.
  • 2013 the degree of the PhD in a speciality "Information Security Methods and Systems, Information Security" (05.13.19) is appropriated.

Additional education

  • 2016 - training sessions: Pentest & Ethical Hacking. These session was held as a part of ENGENSEC programme in the Bonch-Bruevich Saint-Petersburg State University of Telecommunications.

  • 2015 - training sessions: Project Management, Teachers Training for the Digital Forensic. These sessions were held as a part of ENGENSEC programme in the Federal Criminal Police Office of Germany.

  • 2014 - training sessions: Train-the-Trainer, Project Management, Intercultural Competence, Introduction to Distant Learning Systems. These sessions were held as a part of ENGENSEC programme in the Federal Criminal Police Office of Germany.

Top 

Membership in International Societies

Member of
  • St Petersburg Association of Scientists and Scholars (SPASS)
  • International scientific, engineering and educational organization dedicated to advancing the arts, sciences and applications of Information Technology and Microelectronics (Euromicro)

Top 

Identifiers

Top 

Professional activities

Serving as PC member of International and Russian conferences:

2017

  • The 25rd International Euromicro Conference on Parallel, Distributed and Network-based Processing (PDP 2017). St. Petersburg, Russia. March 6-8, 2017. http://www.pdp2017.org (PC and OC Member).

2016

  • The Second International scientific school "Incident management and countering targeted cyber-physical attacks in distributed large-scale critical systems" (IMCTCPA'2016). St.Petersburg, Russia. October, 31 - November, 02, 2016. http://www.comsec.spb.ru/imctcpa16/ (PC and OC Member).
  • The 2016 International Symposium on Mobile Internet Security (MobiSec 2016). Taichung, Taiwan. July 14-15, 2016. http://isyou.info/conf/mobisec16/ (PC Member).
  • The 13th International Symposium on Neural Networks (ISNN 2016). St.Petersburg, Russia. July 6-8, 2016. http://conference.cs.cityu.edu.hk/isnn/ (PC Member).
  • The 24rd International Euromicro Conference on Parallel, Distributed and Network-based Processing (PDP 2016). Heraklion Crete, Greece. February 17-19, 2016. http://www.pdp2016.org (PC Member).

2015

  • The Special Issue of Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA). Republic of Korea. http://jowua.yolasite.com (PC Member).
  • The 23rd International Euromicro Conference on Parallel, Distributed and Network-based Processing (PDP 2015). Turku, Finland. March 4-6, 2015. http://www.pdp2015.org (PC Member).
  • The International scientific school "Incident management and countering targeted cyber-physical attacks in distributed large-scale critical systems" (IMCTCPA'2015). St.Petersburg, Russia. November, 26-28, 2015. http://www.comsec.spb.ru/imctcpa15/ (PC and OC Member).

2014

2013

Top 

Courses Taught

Since 2015 is an assistant professor of Secure Communication Systems (ZSS) department at the Bonch-Bruevich Saint-Petersburg State University of Telecommunications. He teaches following courses:
  • information security basics in telecommunication systems
  • digital forensic (in english)
  • Computer network security

Top 

Students

Research directions of students:

Top 

Awards

2016

  • Chechulin Andrey Alexeevich - Dmitry Levshun and Andrey Chechulin are laureates of the best paper award at LXIII International Theoretical and Practical Conference "Innovations in Science", Novosibirsk, Russia.

2015

  • Chechulin Andrey Alexeevich - Awarded the Medal of the Russian Academy of Science in area of Computer Science, Computer Engineering and Automation (Decree of the Presidium of RAS ¹ 24 dated 17.02.2015).

  • Chechulin Andrey Alexeevich - Winner of the St. Petersburg competitive selection for young scientists and PhD. Project title: "Models and methods development for protection against unwanted and harmful information on the Internet". Diplom: series PSP ¹ 15854.

2014

  • Chechulin Andrey Alexeevich - The winner of the competitive selection for the grants of St. Petersburg in the area of scientific and technical activities. Competition organizer: Committee on Science and Higher Education of St. Petersburg. Project title: "Development of advanced malefactor detection system based on analytical modeling techniques for computer networks". Agreement ¹185-14 from 15.10.2014.
  • Chechulin Andrey Alexeevich - Winner of the "Insane home" competition in the Positive Hack Days conference IV (http://phdays.ru). The first place.

2013

  • Chechulin Andrey Alexeevich - Winner of the Young School competition in the Positive Hack Days III conference (http://phdays.ru). The second place. Presentation topic: "Construction of Attack Graphs for Security Events Analysis".

      

2012

  • Chechulin Andrey Alexeevich - Winner of the competitive selection process for the provision of the 2012 grants to young scientists, young PhD of universities, industry and academic institutions located in St. Petersburg. Competition organizer: Committee on Science and Higher Education of St. Petersburg. Project title: "Development of Advanced Intrusion Detection System".

Top 

Patents and Programms

Programs and databases

2016

  1. Dmitry Levshun, Andrey Chechulin. System for support and management of database of the room access control and management system based on the contactless smart cards. Federal Service for Intellectual Property. Certificate No 2016612543. Registered in the Computer Program Registry 01.03.2016.

  2. Maxim Kolomeets, Andrey Chechulin. Component for network topology visualization using graphs. Certificate ¹ 2016614486. Registered in the Computer Program Registry 25.04.2016.

  3. Maxim Kolomeets, Andrey Chechulin, Igor Kotenko. Component for network security metrics visualization using matrices. Certificate ¹ 2016614487. Registered in the Computer Program Registry 25.04.2016.

  4. Igor Saenko, Andrey Chechulin, Igor Kotenko, Fadey Skorik. Software for operational classification of data about the network status based on the using of artificial neural networks. Certificate ¹ 2016614485. Registered in the Computer Program Registry 25.04.2016.

  5. Igor Saenko, Andrey Chechulin, Sergey Ageev, Alexander Bogdanov. Software for adaptive network traffic analysis for the information security risks evaluation. Certificate ¹ 2016614488. Registered in the Computer Program Registry 25.04.2016.

  6. Igor Kotenko, Maxim Kolomeets, Andrey Chechulin. Component for creation of patterns and retrieval of information objects and relationships between them for visualization of unformalized data with heterogeneous structure. Certificate ¹ 2016663182. Registered in the Computer Program Registry 29.11.2016.

  7. Dmitry Levshun, Andrey Chechulin. Database of the logging server of a secure access control system for Smart House model. Federal Service for Intellectual Property. Certificate N 2016621608. Registered in the database Registry 29.11.2016.

  8. Maxim Kolomeets, Andrey Chechulin, Igor Kotenko. Component for retrieval of information objects and links between them based on patterns, normalization and reducing of the dimension of the information objects and for forming a multi-dimensional matrix of connections between information objects. Certificate ¹ 2016663963. Registered in the Computer Program Registry 20.12.2016.

  9. Maxim Kolomeets, Andrey Chechulin. Component implementing application programming interfaces for providing access to the visualization results for external information systems. Certificate ¹ 2016663709. Registered in the Computer Program Registry 14.12.2016.

  10. Andrey Fedorchenko, Andrey Chechulin. Component for the expert evaluation of the quality of visualization of data with unformalized heterogeneous structure. Certificate ¹ 2016663861. Registered in the Computer Program Registry 19.12.2016.

  11. Dmitry Levshun, Andrey Chechulin, Igor Kotenko. Component implementing the network level of interaction between the controllers based on the I2C protocol. Federal Service for Intellectual Property. Certificate N 2016663951. Registered in the database Registry 20.12.2016.

  12. Mikhail Bulgakov, Andrey Chechulin, Igor Kotenko. Component for DCC protocol analysis for implementing the railways as the obhect of security incident management. Federal Service for Intellectual Property. Certificate N 2016663840. Registered in the database Registry 19.12.2016.

  13. Igor Saenko, Alexei Kushnerevuch, Igor Kotenko, Andrey Chechulin. Component for analysis of big data sets for the computer networks security monitoring. Certificate ¹ 2016663929. Registered in the Computer Program Registry 19.12.2016.

2015

  1. Elena Doynikova, Andrey Chechulin. Generator of random attack sequences for testing of networks of Internet of Things. Federal Service for Intellectual Property. Certificate No 2015615368. Registered in the Computer Program Registry 15.05.2015.

  2. Igor Kotenko, Andrey Chechulin. Attack graph visualization module for network security evaluation system. Federal Service for Intellectual Property. Certificate No 2015615640. Registered in the Computer Program Registry 22.05.2015.

  3. Andrey Chechulin, Igor Kotenko. Network topology visualization module for security information and event management in information and telecommunication systems. Federal Service for Intellectual Property. Certificate No 2015615773. Registered in the Computer Program Registry 22.05.2015.

  4. Maxim Kolomeets, Andrey Chechulin. Room access control and management system client based on the contactless smart cards. Federal Service for Intellectual Property. Certificate No 2015662136. Registered in the Computer Program Registry 17.11.2015.

  5. Maxim Kolomeets, Andrey Chechulin, Igor Kotenko. Room access control and management server based on the contactless smart cards. Federal Service for Intellectual Property. Certificate No 2015662190. Registered in the Computer Program Registry 18.11.2015.

  6. Dmitry Levshun, Andrey Chechulin. Room access control and management system embedded device's sketch based on the contactless smart cards. Federal Service for Intellectual Property. Certificate No 2015662137. Registered in the Computer Program Registry 17.11.2015.

  7. Andrey Fedorchenko, Andrey Chechulin. The statistics analisys and qualitative parameters evoluation component of integrated vulnerability database. Federal Service for Intellectual Property. Certificate N 2015662208. Registered in the Computer Program Registry 18.11.2015.

  8. Andrey Fedorchenko, Andrey Chechulin. The integrated vulnerability database for monitoring systems and security management in information and telecommunication systems. Federal Service for Intellectual Property. Certificate N 2015621655. Registered in the database Registry 17.11.2015.

  9. Igor Saenko, Andrey Chechulin, Sergey Ageev, Igor Kotenko. Classifier of states of computer network elements for risk assessment of information security threats. Federal Service for Intellectual Property. Certificate N 2015662186. Registered in the database Registry 18.11.2015.

  10. Igor Saenko, Andrey Chechulin, Valery Kuvaev, Nikolai Barikin. Software for the operational efficiency evaluation of access to the resources of the common information and communication environment. Federal Service for Intellectual Property. Certificate N 2015662574. Registered in the database Registry 16.11.2015.

  11. Andrey Chechulin, Elena Doyninkova. Component for analysis of the attack models for the protection of the information and telecommunication systems. Federal Service for Intellectual Property. Certificate N 2015662026. Registered in the database Registry 16.11.2015.

  12. Andrey Chechulin, Igor Kotenko. Component of the attack modeling for the protection of the information and telecommunication systems. Federal Service for Intellectual Property. Certificate N 2015662484. Registered in the database Registry 25.11.2015.

2014

  1. Igor Saenko, Sergey Ageev, Andrey Chechulin. Decision support in risk evaluation of information security threats in multiservice networks. Federal Service for Intellectual Property. Certificate No 2014660775. Registered in the Computer Program Registry 15.10.2014.

  2. Igor Saenko, Fadey Skorik, Andrey Chechulin. Solution to the problem of forecasting the network status. Federal Service for Intellectual Property. Certificate No 2014660856. Registered in the Computer Program Registry 17.10.2014.

  3. Igor Kotenko, Elena Doynikova, Andrey Chechulin. Calculation of the security metrics for the monitoring of the current security state of information and telecommunication systems for the deńision support of the responses on the security incidents. Federal Service for Intellectual Property. Certificate No 2014661026. Registered in the Computer Program Registry 22.10.2014.

  4. Igor Kotenko, Andrey Chechulin. Malefactor model formation for security evaluation of information and telecommunication systems. Federal Service for Intellectual Property. Certificate No 2014661028. Registered in the Computer Program Registry 22.10.2014.

2012

  1. Igor Kotenko, Andrey Chechulin, Mikhail Stepashkin. Designer of specifications of computer networks. Certificate No.2012615244. Registered in the Computer Program Registry 9.07.2012.

  2. Igor Kotenko, Andrey Chechulin, Mikhail Stepashkin. System of security analysis of computer networks. Certificate No.2012615245. Registered in the Computer Program Registry 9.07.2012.

  3. Igor Kotenko, Andrey Chechulin, Mikhail Stepashkin. Update of vulnerability database. Certificate No.2012615247. Registered in the Computer Program Registry 9.07.2012.

  4. Igor Saenko, Andrey Chechulin. The solution of the task of synthesizing the VPN network topology for distributed enterprise management system using genetic algorithm. Certificate No.2012615246. Registered in the Computer Program Registry 9.07.2012.

  5. Sergey Alyshev, Sergey Kruglov, Igor Saenko, Aleksandr Sidorov, Andrey Chechulin. The solution of the role mining problem by genetic algorithm. Certificate No.2012612176. Registered in the Computer Program Registry 28.02.2012.

Top 

Projects

Current Grants and Projects

  • Andrey Chechulin (Principal Investigator). President's of Russian Federation Grant ¹ MK-314.2017.9 "Methods, models and algorithms for the construction and usage of a hybrid data warehouse for analytical processing of the information and security events", 2017-2018 (Principal Investigator).
  • Elena Doynikova (Principal Investigator). “Development of models, techniques and alghoritms for automated countermeasures generation in process of security information and events management”. Research grant # 16-37-00338-mol_a of Russian Foundation of Basic Research, 2016-2017 (Researcher).
    Report-2016-16-37-00338-mol-a-short.pdf [application/pdf] (308434 bytes)
  • Andrey Chechulin (Principal Investigator). “Development of mathematical models, techniques and alghoritms of security evaluation, attack modelling and countermeasures selection in near-real time mode”. Research grant # 15-07-07451-a of Russian Foundation of Basic Research, 2015-2017 (Principal Investigator).
    Report-2015-15-07-07451-a-short.pdf [application/pdf] (422782 bytes)
    Report-2016-15-07-07451-a-short.pdf [application/pdf] (422782 bytes)
  • Igor Kotenko (Principal Investigator) – Grant of Russian Science Foundation ¹ 15-11-30029 "Incident management and counteraction against targeted cyber-physical attacks in distributed largescaled mission critical systems taking into account cloud services and networks of the Internet of Things", 2015-2017., 2015-2017 (Researcher).
    RSF-Results-2015-15-11-30029-Eng.pdf [application/pdf] (18843 bytes)
    RSF-Results-2015-15-11-30029-Rus.pdf [application/pdf] (128851 bytes)
    RSF-Results-2016-15-11-30029-Eng.pdf [application/pdf] (104368 bytes)
    RSF-Results-2016-15-11-30029-Rus.pdf [application/pdf] (113753 bytes)

Former Projects

  • Andrey Chechulin (Principal Investigator). “Investigation and development of data mining techniques for warehouses that contain multiple fact tables”. Research grant # 16-37-50067 of Russian Foundation of Basic Research, 2016-2016 (Principal Investigator).
    Report-2016-16-37-50067-mol_nr-short.pdf [application/pdf] (733903 bytes)
  • Andrey Tutorskij (Principal Investigator). “Investigation and development of data models and approaches for their analysis for construction of search system for unified repository for multimedia data from field ethnographic expeditions”. Research grant # 16-37-50073 of Russian Foundation of Basic Research, 2016., 2016-2016 (Researcher).
  • Andrey Tutorskij (Principal Investigator). “Investigation and development of approaches for construction of unified repository for multimedia data from field ethnographic expeditions”. Research grant # 15-37-51126 of Russian Foundation of Basic Research, 2015., 2015-2015 (Researcher).
  • Vasiliy Desnitsky (Principal Investigator). “Development and investigation of models and techniques for design and verification of combined protection mechanisms for information and telecommunication systems with embedded devices on the base of expert knowledge”. Research grant # 14-07-00417-a of Russian Foundation of Basic Research, 2014-2016 (Researcher).
    Report-2014-14-07-00417-a-short.pdf [application/pdf] (258333 bytes)
    Report-2015-14-07-00417-a-short.pdf [application/pdf] (516620 bytes)
    Report-2016-14-07-00417-a-short.pdf [application/pdf] (740843 bytes)
  • Igor Saenko (Principal Investigator). “Models and methods of access to resources in a unified information and communication space of heterogeneous systems based on artificial intelligence technology”. Research grant # 14-07-00697-a of Russian Foundation of Basic Research, 2014-2016 (Lead researcher).
    Report-2014-14-07-00697-a-short.pdf [application/pdf] (303104 bytes)
    Report-2015-14-07-00697-a-short.pdf [application/pdf] (395000 bytes)
    Report-2016-14-07-00697-a-short.pdf [application/pdf] (614957 bytes)
  • ENGENSEC
    Igor Kotenko (Principal Investigator from SPIIRAS). “Educating the Next generation experts in Cyber Security: the new EU-recognized Master’s program”. Research Project of the European Community program TEMPUS ¹ 544455-TEMPUS-1-2013-1-SE-TEMPUS-JPCR (http://engensec.eu/), 2014-2016 (Researcher).
  • Igor Kotenko (Principal Investigator) – State Contract No. 14.604.21.0137 "Development of the technologies of the interactive visualization of the unformalized heterogeneous data for decision support systems in scope of the information security monitoring and management in the information and telecommunication systems". Project of Russian Ministry of Education and Science in scope of the Program "Research and development in priority directions of evolution of the scientific and technological complex of Russia on 2014-2020", 2014-2016., 2014-2016 (Researcher).
    14.604.21.0137_current_status.pdf [application/pdf] (138103 bytes)
  • Igor Kotenko (Principal Investigator) – State Contract No. 14.604.21.0147 "Development of the methods for aggregation, normalization, analysis and visualization of big arrays of the heterogeneous, structured, semi-structured and unstructured data for the security monitoring and management of the distributed network of the electronic consumer devices". Project of Russian Ministry of Education and Science in scope of the Program "Research and development in priority directions of evolution of the scientific and technological complex of Russia on 2014-2020", 2014-2016., 2014-2016 (Researcher).
    14.604.21.0147_current_status.pdf [application/pdf] (142791 bytes)
  • Igor Kotenko (Principal Investigator). State Contract No. 14.604.21.0033 “Models, methods and software for development and analysis of information-telecommunication system security components for Internet of Things concept”. Project of Russian Ministry of Education and Science in scope of the Program "Research and development in priority directions of evolution of the scientific and technological complex of Russia on 2014-2020", 2014-2015., 2014-2015 (Researcher).
    14.604.21.0033_current_status [application/pdf] (262992 bytes)
  • Andrey Chechulin (Principal Investigator). “Investigation and development of heuristic intrusion detection approaches based on data mining techniques for telecommunication networks”. Research grant # 14-37-50735 of Russian Foundation of Basic Research, 2014-2014 (Principal Investigator).
    Report-2014-14-37-50735-mol_nr-short.pdf [application/pdf] (1118208 bytes)
  • Igor Kotenko (Principal Investigator) – State Contract No. 14.616.21.0028 "Perspective methods of correlation of the security information and incidents management information in the critical infrastructures on the base of the convergence of the technologies of the security awareness on the physical and logical levels". Project of Russian Ministry of Education and Science in scope of the Program "Research and development in priority directions of evolution of the scientific and technological complex of Russia on 2014-2020", 2014., 2014-2014 (Researcher).
  • Igor Kotenko (Principal Investigator). “Mathematical models and methods for monitoring and management of information security in computer networks and systems of critical infrastructures based on intelligent services of information protection”. Research grant # 13-01-00843-a of Russian Foundation of Basic Research, 2013-2015 (Researcher).
    Report-2013-13-01-00843-a-short.pdf [application/pdf] (294747 bytes)
    Report-2014-13-01-00843-a-short.pdf [application/pdf] (761856 bytes)
    Report-2015-13-01-00843-a-short.pdf [application/pdf] (562916 bytes)
  • Igor Kotenko (Principal Investigator). “Mathematical models, methods and algorithms of attack modeling, computer systems and networks protection analysis, information security risk analysis and decision-making for selection of security mechanisms in computer systems and networks”. Program "Architectural and software solutions, and security of data-processing supercomputer complexes of new generations" of the Russian Academy of Sciences Branch "Nanotechnologies and Information Technologies", 2012-2014 (Researcher).
  • Igor Kotenko (Principal Investigator). Project in agreement with F-Secure corporation, 2012-2013 (Researcher).
  • Igor Kotenko (Principal Investigator). State Contract No. 11.519.11.4008 “Research and development of methods, models and algorithms of intellectualizing the secirity services in critical infrastructures”. Project of Russian Ministry of Education and Science, 2011-2013 (Researcher).
  • Igor Saenko (Principal Investigator). “Mathematical models and methods of analysis and synthesis of access systems to information and network resources in modern and advanced computer systems and networks through the establishment and application of artificial intelligence. Research grant # 11-07-00435-ą of Russian Foundation of Basic Research, 2011-2013 (Lead researcher).
    Report-2011-11-07-00435-a-short.pdf [application/pdf] (287595 bytes)
    Report-2012-11-07-00435-a-short.pdf [application/pdf] (344443 bytes)
    Report-2013-11-07-00435-a-short.pdf [application/pdf] (317185 bytes)
  • Igor Kotenko (Principal Investigator). “Mathematical models and methods of integrated protection against network attacks and malware in computer networks and systems based on hybrid multi-agent modeling and simulation of computer counteraction, verified adaptive security policies and proactive monitoring by data mining”. Research grant # 10-01-00826-a of Russian Foundation of Basic Research, 2010-2013 (Researcher).
    Report-2010-10-01-00826-a-short.pdf [application/pdf] (191714 bytes)
    Report-2011-10-01-00826-a-short.pdf [application/pdf] (260794 bytes)
    Report-2012-10-01-00826-a-short.pdf [application/pdf] (348160 bytes)
  • Igor Kotenko (Principal Investigator from SPIIRAS). “Design of Secure and energy-efficient embedded systems for Future internet applications (SecFutur)”. Research Project of the European Community seventh framework program (FP7). Contract No. 256668 (http://www.secfutur.eu/), 2010-2013 (Researcher).
  • Igor Kotenko (Principal Investigator from SPIIRAS). “MAnagement of Security information and events in Service InFrastructures (MASSIF)”. Research Project of the European Community seventh framework program (FP7). Contract No. 257475 (http://www.massif-project.eu/), 2010-2013 (Lead researcher).
  • Igor Kotenko (Principal Investigator). Project in agreement with F-Secure corporation, 2010-2011 (Researcher).
  • Igor Kotenko (Principal Investigator). “Mathematical Models, Methods and Algorithms of Proactive Protection against Malware in Computer Networks and Systems”. Program "Architecture, system solutions, software, standardization and information security of computer complexes of new generations" of the Russian Academy of Sciences Branch "Nanotechnologies and Information Technologies", 2009-2011 (Researcher).
  • Igor Kotenko (Principal Investigator). Project in agreement with F-Secure corporation, 2009-2009 (Researcher).
  • Igor Kotenko (Principal Investigator). Project on demand of Section of Applied Problems of Russian Academy of Sciences. Governmental contract, 2008-2009 (Researcher).
  • Igor Kotenko (Principal Investigator“Models and methods of construction and functioning support of intelligent adaptive security systems based on modeling and simulation of security systems behavior, realization of verified security policies, security evaluation and proactive monitoring”. Research grant # 07-01-00547 of Russian Foundation of Basic Research, 2007-2009 (Researcher).
    Report-07-01-00547a-2007short.pdf [application/pdf] (193198 bytes)
    Report-07-01-00547a-2008short.pdf [application/pdf] (205945 bytes)
    Report-07-01-00547a-2009short.pdf [application/pdf] (943498 bytes)
  • Igor Kotenko (Principal Investigator). “Automatic Detection and Response Techniques against Internet Worms”. The subcontract with International Research Institute for Advanced Systems (IRIAS) according to contract with Hewlett-Packard, 2006-2007 (Researcher).
  • Igor Kotenko (Principal Investigator). “Mathematical Models of Active Analysis of Vulnerabilities, Intrusion Detection and Network Attacks Counteraction in Computer Networks based on Multi-agent Technologies”. Program "Optimization of computer architectures to particular classes of tasks, information assurance of network technologies" of the Russian Academy of Sciences Branch "Nanotechnologies and Information Technologies"., 2003-2008 (Researcher).

Top 

Main publications

Papers

2017

  1. Igor Kotenko, Andrey Chechulin, Dmitry Komashinsky. Categorisation of web pages for protection against inappropriate content in the internet. International Journal of Internet Protocol Technology (IJIPT), Vol. 10, No. 1, 2017. P.61-71. (Scopus)
  2. Igor Kotenko, Andrey Chechulin, Alexander Branitskiy. Generation of Source Data for Experiments with Network Attack Detection Software // Journal of Physics: Conference Series, 2017. P.236-245. URL: http://iopscience.iop.org/article/10.1088/1742-6596/820/1/012033 (WoS and Scopus)
  3. Dmitry Levshun, Andrey Chechulin. Development of the information search interface in unified repository of multimedia data from field ethnographic expeditions // Universum: Technical science: digital science journal. 2017. ¹ 4(37). URL: http://7universum.com/ru/tech/archive/item/4623 (in Russian).

2016

  1. Dmitry Novozhilov, Igor Kotenko and Andrey Chechulin. Improving the Categorization of Web Sites by Analysis of Html-Tags Statistics to Block Inappropriate Content. Proceedings of the 9th International Symposium on Intelligent Distributed Computing – IDC’2015, Guimarães, Portugal, 7-9 October 2015. DOI 10.1007/978-3-319-25017-5_24. Springer-Verlag, 2016. P.257-263. (Scopus)
  2. Maxim Kolomeec, Andrey Chechulin, Anton Pronoza, and Igor Kotenko. Technique of Data Visualization: Example of Network Topology Display for Security Monitoring. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), Vol.7, No.1, March, 2016. P.41-57. http://jowua.yolasite.com/vol7no1.php (Scopus)
  3. Vasily Desnitsky, Andrey Chechulin, Igor Kotenko, Dmitry Levshun, Maxim Kolomeec. Application of a Technique for Secure Embedded Device Design Based on Combining Security Components for Creation of a Perimeter Protection System. 24th Euromicro International Conference on Parallel, Distributed, and Network-Based Processing (PDP 2016). Heraklion, Crete, Greece, February, 2016. IEEE Computer Society. 2016. P.609-616. (Scopus)
  4. Vasily Desnitsky, Dmitry Levshun, Andrey Chechulin and Igor Kotenko. Design Technique for Secure Embedded Devices: Application for Creation of Integrated Cyber-Physical Security System. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), Vol.7, No.2, June, 2016. P.60-80. http://jowua.yolasite.com/vol7no2.php (Scopus)
  5. Igor Kotenko, Dmitry Levshun, Andrey Chechulin. Event correlation in the integrated cyber-physical security system. Proceedings of the 2016 XIX IEEE International Conference on Soft Computing and Measurements (SCM-2016), IEEE, St. Petersburg, Russia, May 2016. P.484-486. (Scopus)
  6. Maxim Kolomeets, Andrey Chechulin, Igor Kotenko. Visualization Model for Monitoring of Computer Networks Security Based on the Analogue of Voronoi Diagrams. The International Cross Domain Conference and Workshop (CD-ARES 2016). August 31- September 2, 2016. Salzburg, Austria. F. Buccafurri et al. (Eds.): CD-ARES 2016, LNCS 9817, P.141–157, 2016. DOI: 10.1007/978-3-319-45507-5_10 (Scopus)
  7. Igor Kotenko, Andrey Chechulin, Dmitry Komashinsky. Categorization of web pages for protection against inappropriate content in the Internet // International Journal of Internet Protocol Technology (JIPT), 2016. http://www.inderscience.com/info/ingeneral/forthcoming.php?jcode=ijipt
  8. Anton Pronoza, Andrey Chechulin, Igor Kotenko. Mathematical Models of Visualization in SIEM Systems. SPIIRAS Proceedings. 2016. Issue 46. P.90-107. (in Russian).
  9. Andrey Fedorchenko, Dmitry Levshun, Andrey Chechulin, Igor Kotenko. An Analysis of Security Event Correlation Techniques in Siem-Systems. Part 1. SPIIRAS Proceedings. 2016. Issue 47. P.5-27. (in Russian).
  10. Maxim Kolomeec, Andrey Chechulin, Igor Kotenko. Technique for network topology visualization for security monitoring. PJournal of Instrument Engineering. Vol.59, ¹ 10, 2016. P.807-812. DOI 10.17586/0021-3454-2016-59-10-807-812. (in Russian).
  11. Vasily Desnitsky, Andrey Chechulin, Igor Kotenko, Dmitry Levshun, Maxim Kolomeec. Combined Design Technique for Secure Embedded Devices Exemplified by a Perimeter Protection System. SPIIRAS Proceedings. 2016. Issue 48. P.5-31. (in Russian).
  12. Andrey Fedorchenko, Dmitry Levshun, Andrey Chechulin, Igor Kotenko. An Analysis of Security Event Correlation Techniques in Siem-Systems. Part 2. SPIIRAS Proceedings. 2016. Issue 6(49). P.5-27. (in Russian).
  13. Dmitry Novozhilov, Andrey Chechulin, Igor Kotenko. Improving of web-sites categorization on the basis of analysis of HTML-tags statistics for the blocking of inappropriate content. Management-information systems, No 6, 2016. P.65-73. (in Russian).
  14. Igor Kotenko, Dmitry Levshun, Andrey Chechulin, Sergey Bushuev. Event correlation in the integrated cyber-physical security system. XIX International Conference on Soft Computing and Measurements (SCM'2016),Proceedings . Vol. 2, Saint-Petersburg, ETU "LETI". P.327-331. (in Russian).
  15. Andrey Chechulin, Dmitry Novozhilov. Development of a test bed for the efficiency evaluation of intellectual methods for websites classification. International congress "IS&IT16" - International Conference on Artificial Intelligence and Systems. Proceedings. Divnomorskoye, Russia. September 4-11. Taganrog, UFY, 2016. Vol. 2. P.32-37. (in Russian).
  16. Dmitry Levshun, Andrey Chechulin. Mathematical model for description of information objects of different types to organize the search of materials in a single repository of multimedia data from field ethnographic expeditions. LXIII International Theoretical and Practical Conference "Innovations in Science". November 30, 2016. Proceedings. Novosibirsk, 2016. P.21-29. ISBN 2308-6009. (in Russian).
  17. Mikhail Mikhailov, Maxim Kolomeec, Mikhail Bulgakov, Andrey Chechulin. Investigation and determination of general advantages and disadvantages of existing data warehouses types and analysis of applications. Technical sciences – from theory to practice: Proceedings of the 64th International Scientific and Practical Conference – Novosibirsk, SibAK, ¹ 59, 2016. P.22-27. (in Russian).
  18. Andrey Chechulin, Maxim Kolomeec. Application of new visualization techniques for security metrics of computer networks. 18th International Conference “RusCrypto” on Cryptology, Steganography, Digital Signature and Security Systems. Solnechnogorsk, Russia. March 22-25, 2016. http://www.ruscrypto.ru/ (in Russian).
  19. Maxim Kolomeec, Andrey Chechulin. Development of new graphical models for networks visualization. 6th international forum on practical security Positive Hack Days. Moscow, Russia. May 17-18, 2016. http://www.phdays.ru/ (in Russian).
  20. Dmitry Levshun, Andrey Chechulin, Igor Kotenko. Architecture of integrated security system. 25th All-Russian Conference “Methods and technical tools of information security” (MTTIS 2016)”. Proceedings. St.Petersburg, Russia. 4-7 July, 2016. P.53-54. (in Russian).
  21. Andrey Chechulin. The main types of the network changes that should be taken into account during the construction of an analytical attack models. 25th All-Russian Conference “Methods and technical tools of information security” (MTTIS 2016)”. Proceedings. St.Petersburg, Russia. 4-7 July, 2016. P.114-115. (in Russian).
  22. Evgenia Deshevih, Igor Ushakov, Andrey Chechulin. Integration of SIEM systems with security event correlation systems based on Big Data technology. 9th Conference on Information Technologies in Control (ITC) . Proceedings. St.Petersburg, Russia. October 4–6, 2016. P.684-687. (in Russian).
  23. Dmitry Novozhilov, Andrey Chechulin. Development of the platform for experiments with the websites classification methods. 9th Conference on Information Technologies in Control (ITC) . Proceedings. St.Petersburg, Russia. October 4–6, 2016. P.740-749. (in Russian).
  24. Anton Pronoza, Andrey Chechulin, Ian Kopchak. Approach for network security visualization evaluation based on ratio of informativity and ease of perception. 9th Conference on Information Technologies in Control (ITC) . Proceedings. St.Petersburg, Russia. October 4–6, 2016. P.750-757. (in Russian).
  25. Andrey Chechulin. Tehniques for attack models building and modification for network security analysis. 9th Conference on Information Technologies in Control (ITC) . Proceedings. St.Petersburg, Russia. October 4–6, 2016. P.782-785. (in Russian).
  26. Maxim Kolomeec, Igor Kotenko, Andrey Chechulin. Visualization model for cybersecurity monitoring system based on analogue of Voronoi diagrams. 15th National Conference on Artificial Intelligence with International Participation (CAI 2016). October, 3-7, 2016. Smolensk, Russia. Proceedings of the conference. P.180-187. (in Russian).
  27. Dmitry Levshun, Andrey Chechulin, Igor Kotenko. Secure inter-controller interaction based on I2C protocol. XV Ąnniversary Saint-Petersburg International Conference "Regional informatics-2016 (RI-2016)". Proceedings. St. Petersburg, 2016. P.169-170. (in Russian).
  28. Dmitry Novozhilov, Andrey Chechulin. Metrics for the analysis of the structural features of the web pages by machine learning methods. XV Ąnniversary Saint-Petersburg International Conference "Regional informatics-2016 (RI-2016)". Proceedings. St. Petersburg, 2016. P.184-185. (in Russian).
  29. Mikhail Mikhailov, Andrey Chechulin. Scanner based on clustering and correlation metdods for data warehouses. XV Ąnniversary Saint-Petersburg International Conference "Regional informatics-2016 (RI-2016)". Proceedings. St. Petersburg, 2016. P.181. (in Russian).
  30. Mikhail Bulgakov, Andrey Chechulin. Development of hardware and software for the simulation of the security incidents in railway systems. XV Ąnniversary Saint-Petersburg International Conference "Regional informatics-2016(RI-2016)". Proceedings. St. Petersburg, 2016. P.151. (in Russian).
  31. Maxim Kolomeec, Andrey Chechulin, Yan Kopchak. Development of a graphical interface for visualization of computer network security systems. XV Ąnniversary Saint-Petersburg International Conference "Regional informatics-2016 (RI-2016)" Proceedings. St. Petersburg, 2016. P.166-167. (in Russian).
  32. Dmitry Levshun, Andrey Chechulin. Comparison of approaches for the construction of a database for the organization of research materials in a unified repository for multimedia data from field ethnographic expeditions. XV Ąnniversary Saint-Petersburg International Conference "Regional informatics-2016 (RI-2016)". Proceedings. St. Petersburg, 2016. P.330-331. (in Russian).
  33. Nikita Dubrovin, Igor Ushakov, Andrey Chechulin. Application of Big Data Technology in Security Information and Event Management Systems // 5th International Conference on Advanced Infotelecommunication ("ICAIT-2016"). March, 10-11, 2016. Collection of scientific papers. Saint-Petersburg, 2016. P.348-353. (in Russian).
  34. Andrey Chechulin, Maxim Kolomeec, Igor Kotenko, Sergey Busuev. Architecture of software prototype of heterogeneous data visualization system. XXIX International scientific conference "Mathematical Methods in Technique and Technologies - MMTT-29", 31 May - 3 June, 2016, Proceedings.St. Petersburg State Institute of Technology, St. Petersburg, Russia, 2016, Vol.4. P.142-144. (in Russian).
  35. Vasily Desnitsky, Andrey Chechulin. Information flow verification technique for Internet of things systems. XV Ąnniversary Saint-Petersburg International Conference "Regional informatics-2016 (RI-2016)". Proceedings. St. Petersburg, 2016. P.156-157. (in Russian).

2015

  1. Andrey Fedorchenko, Igor Kotenko and Andrey Chechulin. Design of integrated vulnerabilities database for computer networks security analysis. 23th Euromicro International Conference on Parallel, Distributed, and Network-Based Processing (PDP 2015). Turku, Finland, March, 2015. 1066-6192/15 © 2015 IEEE DOI 10.1109/PDP.2015.112 IEEE Computer Society. 2015. P.559-566. (Scopus, WoS)
  2. Igor Kotenko, Andrey Fedorchenko and Andrey Chechulin. Integrated repository of security information for network security evaluation. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), Vol.6, No.2, June, 2015. P.41-57. http://jowua.yolasite.com/vol6no2.php (Scopus)
  3. Igor Kotenko, Andrey Chechulin, Dmitry Komashinsky. Evaluation of Text Classification Techniques for Inappropriate Web Content Blocking // The IEEE 8th International Conference on “Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications” (IDAACS'2015). Proceedings. Warsaw, Poland, September 24-26, 2015. P.412-417. (Scopus)
  4. Andrey Chechulin, Igor Kotenko. Attack Tree-based Approach for Real-Time Security Event Processing. Automatic Control and Computer Sciences, Allerton Press, Inc., Vol. 49, ¹ 8, 2015. P.701–704. (Scopus)
  5. Maxim Kolomeec, Andrey Chechulin and Igor Kotenko. Methodological Primitives for Phased Construction of Data Visualization Models. Journal of Internet Services and Information Security (JISIS), Vol.5, No.4, November, 2015. P.60-84. http://www.jisis.org/vol5no4.php
  6. Igor Kotenko, Andrey Chechulin, Dmitry Komashinsky. Automated categorization of web-sites for inappropriate content blocking. Problems of information security. Computer systems. ¹ 2, 2015. P.69-79. (in Russian).
  7. Maxim Kolomeec, Andrey Chechulin, Igor Kotenko. Review of Methodological Primitives for the Phased Construction of Data Visualization Model .SPIIRAS Proceedings. 2015. Issue 42. P.232-257. (in Russian).
  8. Dmitry Levshun, Andrey Chechulin. Problems of construction a single repository of multimedia data from field ethnographic expeditions. Technical sciences – from theory to practice. 2015, ¹46, Novosibirsk, SibAK, P.25-30. (in Russian).
  9. Igor Kotenko, Evgenia Novikova, Andrey Chechulin. Visualization of security metrics for security monitoring and event management. Problems of information security. Computer systems. ¹ 4, 2015. P.42-47. (in Russian).
  10. Valery Kuvaev, Andrey Chechulin, Viacheslav Efimov, Konstantin Lizhinkin. Options for the design a unified information space for the integration of heterogeneous automated systems. Information and Space. Scientific and technical journal, ¹ 4, 2015, P.83-87. (in Russian).
  11. Elena Doynikova, Igor Kotenko, Andrey Chechulin. Dynamic Assessment of Computer Networks Security in SIEM Systems . Information Technology Security, ¹ 3, 2015. P.33-42. (in Russian).
  12. Andrey Fedorchenko, Igor Kotenko, Andrey Chechulin. Development of Information Access and Management Services for Integrated Vulnerability Database. Security of Information Technologies, ¹ 4, 2015. P.26-32. (in Russian).
  13. Igor Kotenko, Igor Saenko, Andrey Chechulin. Development of new generation of security information and event management systems. 24th All-Russian Conference “Methods and technical tools of information security” (MTTIS 2015)”. Proceedings. St.Petersburg, Russia. 29 June - 02 July, 2015. P.123-124. (in Russian).
  14. Anton Pronoza, Andrey Chechulin. Model of information gathering process for a heterogeneous network structure investigation for visualization component of security information and event management systems.24th All-Russian Conference “Methods and technical tools of information security” (MTTIS 2015)”. Proceedings. St.Petersburg, Russia. 29 June - 02 July, 2015. P.125-127. (in Russian).
  15. Andrey Chechulin, Anton Pronoza. Classification and analysis of network objects' relations types for further visualization. 24th All-Russian Conference “Methods and technical tools of information security” (MTTIS 2015)”. Proceedings. St.Petersburg, Russia. 29 June - 02 July, 2015. P.132-133. (in Russian).
  16. Andrey Chechulin. Classification and models development for network objects relation representation. International congress IS&IT15 - International Conference on Artificial Intelligence and Systems. Proceedings. Divnomorskoye, Russia. September 2-9, 2015. Mosńow, Fizmathlit, 2015. Vol. 2. P.165-170. (in Russian).
  17. Dmitry Smirnov, Andrey Chechulin. Security data correlation in IoT networks. 17th International Conference “RusCrypto” on Cryptology, Steganography, Digital Signature and Security Systems. Solnechnogorsk, Russia. March 22-25, 2015. http://www.ruscrypto.ru/ (in Russian).
  18. Maxim Kolomeec, Andrey Chechulin, Igor Kotenko. Visualization of security settings of computer networks using a Voronov's diagram. IX Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2015)", Saint-Petersburg, October 28-30, 2015. The proceedings of conference, 2015. P.73-74. (in Russian).
  19. Dmitry Levshun, Andrey Chechulin, Maxim Kolomeec, Igor Kotenko. An architecture of access management system to a room on the base of contactless smart cards. IX Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2015)", Saint-Petersburg, October 28-30, 2015. The proceedings of conference, 2015. P.76. (in Russian).
  20. Dmitry Novozhilov, Andrey Chechulin. Development of software tools to support the experiments on a web site classification. IX Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2015)", Saint-Petersburg, October 28-30, 2015. The proceedings of conference, 2015. P.80-81. (in Russian).
  21. Anton Pronoza, Andrey Chechulin, Sergey Bushuev. A model for presentation of heterogeneous structure of information objects of a computer network for a subsystem of SIEM visualization. IX Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2015)", Saint-Petersburg, October 28-30, 2015. The proceedings of conference, 2015. P.82-83. (in Russian).
  22. Sergey Bushuev, Andrey Chechulin, Anton Pronoza. Classification of sources of data on network objects and their relationships. IX Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2015)", Saint-Petersburg, October 28-30, 2015. The proceedings of conference, 2015. P.62-63. (in Russian).
  23. Andrey Chechulin. Mathematical models and algorithms for modeling attacks and the development of countermeasures in near-real time. IX Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2015)", Saint-Petersburg, October 28-30, 2015. The proceedings of conference, 2015. P.90. (in Russian).
  24. Chechulin A.A. Models and methods development for protection against unwanted and harmful information on the Internet // 20th St.Petersburg assembly of the young scientists and specialists. Proceedings.St.Petersburg, 2015. P.133. (in Russian).
  25. Alexander Mozhaev, Alexander Nozik, Alexander Strukov, Andrey Chechulin. Modern trends in structural and logical analysis of reliability and cybersecurity of Automated Process Control Systems (APCS). International Science School "Modeling and Analysis of Safety and Risk in Complex Systems" (MABR-2015). St.Petersburg, Russia, November 17-19, 2015. (in Russian).

2014

  1. Igor Kotenko, Elena Doynikova and Andrey Chechulin. Security metrics based on attack graphs for the Olympic Games scenario. 22th Euromicro International Conference on Parallel, Distributed, and Network-Based Processing (PDP 2014). Torino, Italy, February, 2014. 1066-6192/14 © 2014 IEEE DOI 10.1109/PDP.2014.113 IEEE Computer Society. 2014. P.561-568. (WoS, Scopus)
  2. Igor Kotenko, Andrey Chechulin, Andrey Shorov, Dmitry Komashinsky. Analysis and Evaluation of Web Pages Classification Techniques for Inappropriate Content Blocking. P. Perner (Ed.): 14th Industrial Conference on Data Mining (ICDM 2014), Lecture Notes in Artificial Intelligence (LNAI 8557), DOI 10.1007/978-3-319-08976-8. P.39–54. ISSN 0302-9743, ISBN 978-3-319-08975-1. (WoS, Scopus)
  3. Igor Kotenko, Andrey Shorov, Andrey Chechulin, Evgenia Novikova. Dynamical Attack Simulation for Security Information and Event Management. V. Popovich et al. (eds.), Information Fusion and Geographic Information Systems (IF&GIS 2013), Lecture Notes in Geoinformation and Cartography, DOI: 10.1007/978-3-642-31833-7_14, Springer-Verlag, Berlin, Heidelberg, 2014. P.219-234.
  4. Igor Kotenko, Andrey Chechulin. Fast Network Attack Modeling and Security Evaluation based on Attack Graphs // Journal of Cyber Security and Mobility, Vol.3, No.1, 2014. P.27–46.
  5. Igor Kotenko, Igor Saenko, Andrey Chechulin. Proactive management of security information and events in the information and telecommunication systems. Questions of Radioelectronics. Issue 1 (3). Moscow, ZNII "Elektronika", 2014. P.170-180. ISSN: 0233-9950 (in Russian).
  6. Andrey Fedorchenko, Andrey Chechulin, Igor Kotenko. Investigation of open vulnerability databases and their applicability evaluation for computer networks security evaluation systems. Management-information systems, 2014, ¹5, P.72-79. ISSN 1684-8853. (in Russian).
  7. Andrey Chechulin, Igor Kotenko. Attack Graph Construction for Security Events Analysis. Security of Information Technologies, ¹ 3, 2014, P.135-141. (in Russian).
  8. Andrey Chechulin, Igor Kotenko. Real-time security events processing using an approach based on the attack trees analysis. Problems of information security. Computer systems. ¹ 3, 2014. P.56-59. (in Russian).
  9. Andrey Fedorchenko, Andrey Chechulin, Igor Kotenko. Analytical overview of open vulnerabilities databases. Problems of information security. Computer systems. ¹ 3, 2014. P.131-135. (in Russian).
  10. Andrey Fedorchenko, Andrey Chechulin, Igor Kotenko. Construction of the integrated vulnerability database. Proceedings of the universities. Journal of Instrument Engineering. Vol.57, ¹ 11, 2014. ISSN 0021-3454. P.62-67. (WoS) (in Russian).
  11. Vasily Desnitsky, Andrey Chechulin. Generalized intruder model and verification of information systems with embedded devices. Technical sciences – from theory to practice. 2014, ¹39, Novosibirsk, SibAK, P.7-21. (in Russian).
  12. Anton Noskov, Andrey Chechulin. Investigation heuristic approach to detect attacks on the telecommunications network based on data mining techniques. Proceedings of SPIIRAS. Issue 6 (37). SPb: Nauka, 2014. (in Russian).
  13. Andrey Fedorchenko, Andrey Chechulin, Igor Kotenko. Analytical review of open vulnerability databases. 16th Conference “RusCrypto” on Cryptology, Steganography, Digital Signature and Security Systems. Solnechnogorsk, Russia. March 25-28, 2014. http://www.ruscrypto.ru/ (in Russian).
  14. Andrey Chechulin, Igor Kotenko. Security event handling in real time mode using an approach based on the attack trees analysis. 16th Conference “RusCrypto” on Cryptology, Steganography, Digital Signature and Security Systems. Solnechnogorsk, Russia. March 25-28, 2014. http://www.ruscrypto.ru/ (in Russian).
  15. Andrey Chechulin, Igor Kotenko. Application of Big Data processing methods for computer network infrastructure security.7th Russian Multiconference on Problems in Control (MPC). Conference on Information Technologies in Control (ITC).Proceedings. St.Petersburg, Russia. October 7–9, 2014. P.614-617. (in Russian).
  16. Andrey Fedorchenko, Andrey Chechulin, Igor Kotenko. Integrated vulnerabilities database for computer networks security evalution systems. 7th Russian Multiconference on Problems in Control (MPC). Conference on Information Technologies in Control (ITC).Proceedings. St.Petersburg, Russia. October 7–9, 2014. P.638-641. (in Russian).
  17. Andrey Chechulin, Igor Kotenko. Design of the system for users protection against inappropriate content in the Internet. 7th Russian Multiconference on Problems in Control (MPC). Conference on Information Technologies in Control (ITC).Proceedings. St.Petersburg, Russia. October 7–9, 2014. P.642-647. (in Russian).
  18. Andrey Chechulin. The main challenges in the design of an electronic catalog of field data. Maklaevskie chtenya-2014. St. Petersburg, Russia. April 15-16, 2014. http://www.kunstkamera.ru/science/konferencii_i_seminary/2014/maklaevskie_chteniya2014/ (in Russian).
  19. Andrey Chechulin, Igor Kotenko, Vasily Desnitsky. Features of the information security systems design in cyber-physical systems. 23th All-Russian Conference “Methods and technical tools of information security” (MTTIS 2014)”. Proceedings. St.Petersburg, Russia. 30 June - 03 July, 2014. P.67-69. (in Russian).
  20. Vasily Desnitsky, Andrey Chechulin. Verification of information and telecommunication systemms with embedded devices on the base of generalized intuder model. 23th All-Russian Conference “Methods and technical tools of information security” (MTTIS 2014)”. Proceedings. St.Petersburg, Russia. 30 June - 03 July, 2014. P.66-67. (in Russian).
  21. Dmitry Novozhilov, Andrey Chechulin. Web-page text language recognition techniques. XIV Saint-Petersburg International Conference “Regional informatics-2014” (“RI-2014”). Proceedings. St. Petersburg, 2014. Š.155-156. (in Russian).
  22. Dmitry Levshun, Andrey Chechulin. Construction of the classification scheme for the existing methods of security events correlation. XIV Saint-Petersburg International Conference “Regional informatics-2014” (“RI-2014”). Proceedings. St. Petersburg, 2014. Š.148-149. (in Russian).
  23. Andrey Chechulin, Dmitry Komashinkiy. Approach for classification of websites in foreign languages in the Internet. XIV Saint-Petersburg International Conference “Regional informatics-2014” (“RI-2014”). Proceedings. St. Petersburg, 2014. Š.169-170. (in Russian).
  24. Andrey Chechulin, Igor Kotenko. Software prototype of analytical attacks modeling component for security information and events management systems. XIV Saint-Petersburg International Conference “Regional informatics-2014” (“RI-2014”). Proceedings. St. Petersburg, 2014. Š.170-171. (in Russian).
  25. Alexandra Kasatkina, Andrey Chechulin. Multimedia database on Ifugao folklore (Philippines): specifying a problem and selecting solutions. All-Russian Research-to-Practice Conference "Native minorities in dominating society: Practice of applied studies and efficient tools of ethnic". Kemerovo, 17-18 October 2014. Proceedings. Kemerovo, 2014. Š.312-317. (in Russian).
  26. Andrey Fedorchenko, Andrey Chechulin, Igor Kotenko. The integrated database of vulnerabilities. International Scientific and Practical Conference "Theoretical and applied problems of information security." June 19, 2014, Minsk, Academy of MIA Republic of Belarus, 2014. (in Russian).
  27. Andrey Chechulin. The analysis and classification of a possible changes occurring in a computer network and their influence on trees of attacks. International Scientific and Practical Conference "Theoretical and applied problems of information security." June 19, 2014, Minsk, Academy of MIA Republic of Belarus, 2014. (in Russian).
  28. Igor Kotenko, Igor Saenko, Andrey Chechulin. Proactive management of information and security events in network NGN. Seminar of the International Telecommunication Union "Transition developing countries with existing networks to next generation network (NGN): technical, economic, legal and political aspects", St. Petersburg, St. Petersburg GUT Bonch-Bruyevich. 23-25 June 2014. (in Russian).
  29. Andrey Chechulin, Igor Kotenko. Attack Graph Construction for Security Events Analysis. 4th international forum on practical security Positive Hack Days. Moscow, Russia. May 21-22, 2014. http://www.phdays.ru/ (in Russian).

2013

  1. Igor Kotenko, Andrey Chechulin. A Cyber Attack Modeling and Impact Assessment Framework. 5th International Conference on Cyber Conflict 2013 (CyCon 2013). Proceedings. IEEE and NATO COE Publications. 4-7 June 2013, Tallinn, Estonia. 2013. P.119-142. (WoS, Scopus)
  2. Igor Kotenko, Andrey Chechulin. Computer Attack Modeling and Security Evaluation based on Attack Graphs. The IEEE 7th International Conference on “Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications” (IDAACS'2013). Proceedings. Berlin, Germany, September 12-14, 2013. P.614-619. (Scopus)
  3. Igor Kotenko, Igor Saenko, Olga Polubelova, Andrey Chechulin. Design and Implementation of a Hybrid Ontological-Relational Data Repository for SIEM systems. Future internet, Vol. 5, ¹3, 2013. P.355-375. ISSN 1999-5903. doi:10.3390/fi5030355.
  4. Igor Kotenko, Olga Polubelova, Andrey Chechulin. Design of the ontology based data model for the network attack modeling system. Proceedings of SPIIRAS. Issue 3 (26). St.Petersburg, Nauka, 2013. P.26-39. (in Russian).
  5. Andrey Chechulin. Technique of rapid construction, modification and analysis of attack trees. Proceedings of SPIIRAS. Issue 3 (26). St.Petersburg, Nauka, 2013. P.40-53. (in Russian).
  6. Igor Kotenko, Elena Doynikova, Andrey Chechulin. Dynamical recalculation of the security metrics on the example of attack potentiality. Proceedings of SPIIRAS. Issue 7 (30). St. Petersburg, Nauka, 2013. P.26-39. ISSN: 2078-9181. (in Russian).
  7. Igor Kotenko, Andrey Chechulin. Usage of attack graphs for network security evaluation and security events processing. High availability systems, ¹3 (9), 2013. P.103-111. (in Russian).
  8. Dmitry Komashinskiy, Igor Kotenko, Andrey Chechulin, Andrey Shorov. Automatic system for categorization of websites for blocking web pages with inappropriate.High availability systems, ¹3 (9), 2013. P.119-127. (in Russian).
  9. Andrey Chechulin. Technique of attack graphs building for systems of security event analysis. Innovations in Science, ¹16-1, 2013. Novosibirsk, SibAK, 2013. Š.156-160. (in Russian).
  10. Andrey Chechulin. Technique of attack graphs building for systems of security event analysis. XVI International Theoretical and Practical Conference "Innovations in Science". January, 28. 2013. Proceedings. Novosibirsk, 2013. P.156-161. ISBN 978-5-4379-0210-3. (in Russian).
  11. Vasily Desnitsky, Igor Kotenko, Andrey Chechulin. Information flow verification for design of protected information systems with embedded devices. High availability systems, ¹ 3 (9), 2013. P.112-118. (in Russian).
  12. Andrey Chechulin, Igor Kotenko. Construction of attack graphs for security events correlation. 15th Conference “RusCrypto” on Cryptology, Steganography, Digital Signature and Security Systems. Solnechnogorsk, Russia. March 28-30, 2013. http://www.ruscrypto.ru/ (in Russian).
  13. Vasily Desnitsky, Igor Kotenko, Andrey Chechulin. Design of secure information systems with embedded devices. 15th Conference “RusCrypto”. Solnechnogorsk, Russia. March 28-30, 2013. http://www.ruscrypto.ru/ (in Russian).
  14. Dmitry Komashinskiy, Andrey Chechulin, Igor Kotenko, Andrey Shorov. Categorization of web sites for inadmissible web pages blocking systems. 15th Conference “RusCrypto” on Cryptology, Steganography, Digital Signature and Security Systems. Solnechnogorsk, Russia. March 28-30, 2013. http://www.ruscrypto.ru/ (in Russian).
  15. Andrey Shorov, Andrey Chechulin, Igor Kotenko. Categorization of web sites for inadmissible web pages blocking for decision support systems in cyber security. 22th All-Russian Conference “Methods and technical tools of information security”(MTTIS 2013)”. Proceedings. St.Petersburg, Russia. July 08-11, 2013. P.75-77. (in Russian).
  16. Andrey Chechulin. Recognition of malefactors by attack tress analysis. 22th All-Russian Conference “Methods and technical tools of information security”(MTTIS 2013)”. Proceedings. St.Petersburg, Russia. July 08-11, 2013. P.141-142. (in Russian).
  17. Andrey Shorov, Andrey Chechulin, Igor Kotenko. Categorization of web sites for inadmissible web pages blocking systems by textual and graphical content analysis. VIII Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2013)", Saint-Petersburg, October 23-25, 2013. The proceedings of conference, 2013. P.129-130. (in Russian).
  18. Andrey Chechulin. Application of analytical attack modeling for security level increasing of distributed information systems. VIII Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2013)", Saint-Petersburg, October 23-25, 2013. The proceedings of conference, 2013. P.127-128. (in Russian).

2012

  1. Jose Fran. Ruiz, Vasily Desnitsky, Rajesh Harjani, Antonio Manna, Igor Kotenko and Andrey Chechulin. A Methodology for the Analysis and Modeling of Security Threats and Attacks for Systems of Embedded Components. Proceeding of the 20th International Euromicro Conference on Parallel, Distributed and Network-based Processing (PDP 2012). Garching/Munich, February, 2012. P.261-268. (Scopus)
  2. Vasily Desnitsky, Igor Kotenko, Andrey Chechulin. Configuration-based approach to embedded device security. Lecture Notes in Computer Science, Springer-Verlag. The Sixth International Conference "Mathematical Methods, Models and Architectures for Computer Networks Security" (MMM-ACNS-2012). October 17-19, 2012, St. Petersburg, Russia. P.270-285. (Scopus)
  3. Andrey Chechulin, Igor Kotenko, Vasily Desnitsky. An Approach for Network Information Flow Analysis for Systems of Embedded Components. Lecture Notes in Computer Science, Springer-Verlag. The Sixth International Conference "Mathematical Methods, Models and Architectures for Computer Networks Security" (MMM-ACNS-2012). October 17-19, 2012, St. Petersburg, Russia. P.146-155. (Scopus)
  4. Igor Kotenko, Andrey Chechulin, Evgenia Novikova. Attack Modelling and Security Evaluation for Security Information and Event Management. SECRYPT 2012. International Conference on Security and Cryptography. Proceedings. Rome, Italy. 24–27 July 2012. P.391-394. (Scopus)
  5. Igor Kotenko, Andrey Chechulin. Common Framework for Attack Modeling and Security Evaluation in SIEM Systems. 2012 IEEE International Conference on Green Computing and Communications, Conference on Internet of Things, and Conference on Cyber, Physical and Social Computing. Besançon, France, September 11-14, 2012. Los Alamitos, California. IEEE Computer Society. 2012. P.94-101. (WoS, Scopus)
  6. Igor Kotenko, Andrey Chechulin. Attack Modeling and Security Evaluation in SIEM Systems. International Transactions on Systems Science and Applications, SIWN Press. Volume 8. December 2012. P.129-147, ISSN 1751-1461 (print) ISSN 2051-5642 (online) sai: itssa.0008.2012.041.
  7. Igor Kotenko, Andrey Chechulin and Elena Doynikova. Analytical Attack Modeling in Security Information and Event Management Systems. Proceedings of the Work in Progress Session held in connection with the 20th Euromicro International Conference on Parallel, Distributed and network-based Processing (PDP 2012). Garching/Munich, February 2012. SEA-Publications. SEA-SR-31. 2012. P.27-28.
  8. Vasily Desnitsky, Igor Kotenko, Andrey Chechulin. Configuration of secure systems with embedded and mobile devices. Issues of information Protection,¹2, 2012. P.20-28. (in Russian).
  9. Igor Kotenko, Igor Saenko, Olga Polubelova, Andrey Chechulin. Methods for security event and information management for computer networks protection. Problems of information security. Computer systems. ¹ 3, 2012. P.57-68. (in Russian).
  10. Andrey Chechulin, Igor Kotenko, Vasily Desnitsky. Information flow analysis for development of secure systems with embedded devices. High availability systems, ¹ 2, 2012. P.116-122. (in Russian).
  11. Olga Polubelova, Igor Kotenko, Igor Saenko, Andrey Chechulin. Application of the ontological approaches and logical inference to security event and information management. High availability systems, ¹ 2, 2012. P.100-108. (in Russian).
  12. Vasily Desnitsky, Igor Kotenko, Andrey Chechulin. Configuring components of combined protection of embedded devices on the basis of solving optimality task. High availability systems, ¹ 2, 2012. P.50-56. (in Russian).
  13. Igor Kotenko, Igor Saenko, Olga Polubelova, Andrey Chechulin. Application of the methods of security event and information management for information protection in the critical infrastructures. Proceedings of SPIIRAS. Issue 1 (20). St.Petersburg, Nauka, 2012. P.27-56. (in Russian).
  14. Igor Kotenko, Elena Doynikova, Andrey Chechulin. Total enumeration and classification of attack patterns (CAPEC): description and application examples. Information Security. Inside, ¹ 4, 2012. P.54-66. (in Russian).
  15. Andrey Chechulin, Igor Kotenko. Analysis of real-time events in a network using the network attacks modeling. VII Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2011)", Saint-Petersburg, October 26-28. The proceedings of conference, 2012. P.93-98. (in Russian).
  16. Colin Fidge, Andrey Chechulin. Information flow analysis for development of secure systems with embedded devices. 14th Conference “RusCrypto” on Cryptology, Steganography, Digital Signature and Security Systems. Solnechnogorsk, Russia. March 28-30, 2012. http://www.ruscrypto.ru/ (in Russian).
  17. Igor Kotenko, Andrey Chechulin. Analytical attack modeling in security event and information management systems. 21th All-Russian Conference "Methods and technical tools of information security" (MTTIS 2012). Proceedings. St.Petersburg, Russia. June 24-29, 2012. P.57-58. (in Russian).
  18. Andrey Chechulin, Vasily Desnitsky, Igor Kotenko. Information flow analysis for development of secure systems with embedded devices. 21th All-Russian Conference "Methods and technical tools of information security" (MTTIS 2012). Proceedings. St.Petersburg, Russia. June 24-29, 2012. P.35-37. (in Russian).
  19. Vasily Desnitsky, Andrey Chechulin. Analysis of incompatibilities between security components in design process of secure embedded devices. 21th All-Russian Conference "Methods and technical tools of information security" (MTTIS 2012). Proceedings. St.Petersburg, Russia. June 24-29, 2012. P.17-19. (in Russian).
  20. Andrey Chechulin. Technique for evaluation of the efficiency of combined protection against network scanning. 21th All-Russian Conference "Methods and technical tools of information security" (MTTIS 2012). Proceedings. St.Petersburg, Russia. June 24-29, 2012. P.79-81. (in Russian).
  21. Igor Kotenko, Andrey Chechulin. Analytical attack modeling for security event and information management. International congress IS&IT - International Conference on Artificial Intelligence and Systems. Proceedings. Divnomorskoye, Black Sea Coast, Russia. September 2-9. Moskow, Fizmathlit, 2012. Vol.1. P.385-391. (in Russian).
  22. Evgenia Novikova, Chechulin A.A., Igor Kotenko. Visualisation techniques for computer attack counteraction in security information and event management systems. St. Petersburg Scientific Forum "Science and Society". "Science and Mankind Progress". VII St.Petersburg Nobel Prize Laureates Meeting. Proceedings. St.Petersburg, Russia. P.151-152. (in Russian).
  23. Vasily Desnitsky, Igor Kotenko, Andrey Chechulin. Design of secure embedded systems in European Union project SecFutur. 5th Russian Multiconference on Problems in Control (MPC). Conference on Information Technologies in Control (ITC).Proceedings. St.Petersburg, Russia. October 9–11, 2012. P.699-708. (in Russian).
  24. Andrey Chechulin, Igor Kotenko, Evgenia Novikova, Elena Doynikova. Attacks and protection mechanisms in the security event and information management. 5th Russian Multiconference on Problems in Control (MPC). Conference on Information Technologies in Control (ITC).Proceedings. St.Petersburg, Russia. October 9–11, 2012. P.735-739. (in Russian).
  25. Vasily Desnitsky, Andrey Chechulin. Analysis of incompatibilities of security components in embedded devices. XIII Saint-Petersburg International Conference “Regional informatics-2012” (“RI-2012”). Proceedings. St. Petersburg, 2012. P.93. (in Russian).
  26. Vasily Desnitsky, Andrey Chechulin, Igor Kotenko. Using anytime algorithms of attack modeling and security evaluation in SIEM systems. XIII Saint-Petersburg International Conference “Regional informatics-2012” (“RI-2012”). Proceedings. St. Petersburg, 2012. P. 92. (in Russian).
  27. Andrey Chechulin, Igor Kotenko. Attack graph building based on malefactor models and information on vulnerabilities and attack patterns. XIII Saint-Petersburg International Conference “Regional informatics-2012” (“RI-2012”). Proceedings. St. Petersburg, 2012. P.129-130. (in Russian).
  28. Andrey Chechulin. Malefactor goals recognition based on analysis of security events and attack graphs. XIII Saint-Petersburg International Conference “Regional informatics-2012” (“RI-2012”). Proceedings. St. Petersburg, 2012. P.130. (in Russian).
  29. Andrey Chechulin, Vasily Desnitsky. Information flow analysis in the task of embedded system analysis. XIII Saint-Petersburg International Conference “Regional informatics-2012” (“RI-2012”). Proceedings. St. Petersburg, 2012. P.129. (in Russian).
  30. Andrey Chechulin. Development of an advanced intrusion detection system. XVII St. Petersburg assembly of young scientists and specialists. Proceedings. October 12, 2012. P.196. (in Russian).

2011

  1. Vasily Desnitsky, Igor Kotenko, Andrey Chechulin. An abstract model for embedded systems and intruders. Proceedings of the Work in Progress Session held in connection with the 19th Euromicro International Conference on Parallel, Distributed and network-based Processing (PDP 2011). Ayia Napa, Cyprus, February 2011. SEA-Publications. SEA-SR-29. 2011. P.25-26. ISBN 978-3-902457-29-5.
  2. Igor Kotenko, Andrey Chechulin, Elena Doynikova. Combining of Scanning Protection Mechanisms in GIS and Corporate Information Systems. Information Fusion and Geographic Information Systems. Proceedings of the 5th International Workshop on Information Fusion and Geographical Information Systems: Towards the Digital Ocean (IF&GIS 2011). Brest, France, May 10-11, 2011. Brest, France, 2011. Lecture Notes in Geoinformation and Cartography. Springer. 2011. P.45-58. ISSN 1863-2246. (Scopus)
  3. Igor Kotenko, Philipp Nesteruk, Andrey Chechulin. Combining of scanning detection mechanisms in computer networks. Information security problems, ¹ 3, 2011. P.30-34. (in Russian).
  4. Vasily Desnitsky, Andrey Chechulin. Model of the process for secure embedded systems development. High availability systems, ¹ 2, 2011. P.97-101. (in Russian).
  5. Dmitry Komashinkiy, Igor Kotenko, Andrey Chechulin. Categorization of web sites for inadmissible web pages blocking. High availability systems, ¹ 2, 2011. P.102-106. (in Russian).
  6. Igor Kotenko, Vasily Desnitsky, Andrey Chechulin. Investigation of technologies for secure embedded systems design in European Union project SecFutur. Information Security. Inside, ¹ 3, 2011. P.68-75. (in Russian).
  7. Vasily Desnitsky, Igor Kotenko, Andrey Chechulin. Constructing and testing secure embedded systems. XII Saint-Petersburg International Conference “Regional informatics-2010” (“RI-2010”). Selected Proceedings. St. Petersburg, 2011. P.115-121. (in Russian).
  8. Andrey Chechulin, Igor Kotenko. Combining of scanning detection mechanisms. The Ninth All-Russian Scientific Conference "Mathematics and Security of Information Technologies" (MSIT-10). Moscow, 2011. (in Russian).
  9. Vasily Desnitsky, Igor Kotenko, Andrey Chechulin. Abstract model for embedded secure systems. The Nineth All-Russian Scientific Conference "Mathematics and Security of Information Technologies" (MSIT-10). Moscow, 2011. (in Russian).
  10. Andrey Chechulin, Vasily Desnitsky. Intruder model for provision of embedded systems security. The Nineth All-Russian Scientific Conference "Mathematics and Security of Information Technologies" (MSIT-10). Moscow, 2011. (in Russian).
  11. Dmitry Komashinkiy, Andrey Chechulin, Igor Kotenko. Categorization of web pages with inadmissible content. 13th Conference “RusCrypto” on Cryptology, Steganography, Digital Signature and Security Systems. Solnechnogorsk, Russia. March 30 - April 2, 2011. http://www.ruscrypto.ru/ (in Russian).
  12. Vasily Desnitsky, Andrey Chechulin. Unification of a process of secure embedded systems construction. 13th Conference “RusCrypto” on Cryptology, Steganography, Digital Signature and Security Systems. Solnechnogorsk, Russia. March 30 - April 2, 2011. http://www.ruscrypto.ru/ (in Russian).
  13. Andrey Chechulin. Application of combining techniques to the problem of protection against network scanning. 20th All-Russian Conference “Methods and technical tools of information security” (MTTIS 2011)”. Proceedings. St.Petersburg, Russia. June 27 - July 01, 2011. P.63-64. (in Russian).
  14. Ivan Morozov, Andrey Chechulin. Access to information in geographical information systems. 20th All-Russian Conference “Methods and technical tools of information security” (MTTIS 2011)”. Proceedings. St.Petersburg, Russia. June 27 - July 01, 2011. P.34-36. (in Russian).
  15. Andrey Chechulin, Igor Kotenko. Analysis of security events in a real network using a network attack modelling system. VII St.Petersburg Interregional Conference «Information Security of Russian Regions (IBRR-2011). October 26-28, 2011. Proceedings. St.Petersburg, 2011. P.97-98. (in Russian).
  16. Vasily Desnitsky, Igor Kotenko, Andrey Chechulin. Configuration model for combined protection of information systems with embedded devices. VII St.Petersburg Interregional Conference «Information Security of Russian Regions (IBRR-2011). October 26-28, 2011. Proceedings. St.Petersburg, 2011. P.69-70. (in Russian).
  17. Elena Doynikova, Andrey Chechulin, Igor Kotenko, Dmitry Kotenko. Extension of the information risks assessment technique to consider zero day attacks.VII St.Petersburg Interregional Conference «Information Security of Russian Regions (IBRR-2011). October 26-28, 2011. Proceedings. St.Petersburg, 2011. P.71-72. (in Russian).
  18. Igor Kotenko, Igor Saenko, Olga Polubelova, Andrey Chechulin. Methods and tools of designing the repository for SIEM system in critical information infrastructure. The VII St.Petersburg Interregional Conference «Information Security of Russian Regions (ISRR-2011). October 26-28, 2011. Proceedings. St.Petersburg, 2011. P.79-80. (in Russian).
  19. Andrey Chechulin. Cooperation of scanning detection mechanisms. VII St.Petersburg Interregional Conference “Information Security of Russian Regions (IBRR-2011)”. October 26-28, 2011. Proceedings. St.Petersburg, 2011. P.96-97. (in Russian).

2010

  1. Andrey Chechulin, Igor Kotenko. Combining of scanning protection mechanisms in computer networks. Management-information systems, 2010, ¹ 12, P.21-27. ISSN 1684-8853. (in Russian).
  2. Andrey Chechulin. Protection against network attacks based on the combined mechanisms of traffic analysis. 12th International Conference “RusCrypto” on Cryptology, Steganography, Digital Signature and Security Systems. Zvenigorod, Russia. April 1-4, 2010. http://www.ruscrypto.ru/ (in Russian).
  3. Michail Stepashkin, Igor Kotenko, Andrey Chechulin, Alexsander Tulupyev, Tatyana Tulupyeva, Anton Pashenko. Approach to security analysis of automated systems taking into account social-engineering attacks. ÕIX All-Russian Conference “Methods and technical tools of information security” (MTTIS 2010)”. Proceedings. St.Petersburg, Russia. July 5-10, 2010. P.128-129. (in Russian).
  4. Igor Kotenko, Mikhail Stepashkin, Andrey Chechulin, Elena Doynikova, Dmitry Kotenko. Tools for security analysis of automated systems. ÕIX All-Russian Conference “Methods and technical tools of information security” (MTTIS 2010)”. Proceedings. St.Petersburg, Russia. July 5-10, 2010. P.115-116. (in Russian).
  5. Andrey Chechulin. Integration and optimal parameters selection of scanning protection mechanisms. ÕIX All-Russian Conference “Methods and technical tools of information security” (MTTIS 2010)”. Proceedings. St.Petersburg, Russia. July 5-10, 2010. P.25-26. (in Russian).
  6. Vasiliy Desnitsky, Andrey Chechulin, Igor Kotenko. Configuration model of embedded devices. XII Saint-Petersburg International Conference “Regional informatics-2010” (“RI-2010”). Proceedings. St. Petersburg, October 20-22, 2010. P.41-42. ISBN 978-5-904031-99-2. (in Russian).
  7. Vasiliy Desnitsky, Andrey Chechulin. Abstract model of embedded devices. XII Saint-Petersburg International Conference “Regional informatics-2010” (“RI-2010”). Proceedings. St. Petersburg, October 20-22, 2010. P.40-41. ISBN 978-5-904031-99-2. (in Russian).
  8. Andrey Chechulin. Integrating of malicious traffic detection mechanisms. XII Saint-Petersburg International Conference “Regional informatics-2010” (“RI-2010”). Proceedings. St. Petersburg, October 20-22, 2010. P.149. ISBN 978-5-904031-99-2. (in Russian).
  9. Andrey Chechulin, Vasily Desnitsky, Mikhail Stepashkin. Intruder model in the task of security assurance of embedded system. XII Saint-Petersburg International Conference “Regional informatics-2010” (“RI-2010”). Proceedings. St. Petersburg, October 20-22, 2010. P.150. ISBN 978-5-904031-99-2. (in Russian).

2009

  1. Igor Kotenko, Victor Vorontsov, Andrey Chechulin, Alexander Ulanov. Proactive security mechanisms against network worms: approach, implementation and results of experiments. Information Technologies, No.1, 2009. P.37-42. (in Russian).
  2. Andrey Chechulin, Igor Kotenko. Protection against Network Attacks by Methods of Filtering and Normalization of Transport and Network Level Protocols. The 4th International Scientific Conference on Security Issues and Counter Terrorism. The Seventh All-Russian Scientific Conference "Mathematics and Security of Information Technologies" (MSIT-08). 2009. (in Russian).
  3. Andrey Chechulin, Igor Kotenko, Artem Tishkov, Yulia Zozulya, Andrey Shorov. Methods of protection against harmful Web-sites based on reputation evaluation. 11th Conference “RusCrypto” on Cryptology, Steganography, Digital Signature and Security Systems. Zvenigorod, Russia. April 2-5, 2009. http://www.ruscrypto.ru/. (in Russian).
  4. Andrey Chechulin, Igor Kotenko. Detection and Counteraction of Network Attacks based on Combined Mechanisms of Traffic Analysis. ÕVIII All-Russian Conference “Methods and technical tools of information security” (MTTIS 2009)”. Proceedings. St.Petersburg, Russia. June 29 - July 2, 2009. P.69. (in Russian).
  5. Andrey Chechulin. Detection and counteraction to network attacks on the basis of combined mechanisms of the traffic analysis. VI St.Petersburg Interregional Conference «Information Security of Russian Regions (ISRR-2009). October 28-30, 2009. Proceedings. St.Petersburg, 2009. P.143-144. (in Russian).

2008

  1. Igor Kotenko, Victor Vorontsov, Artem Tishkov, Andrey Chechulin, Alexander Ulanov. Investigation of Proactive Protection Mechanisms against Network Worms. Third International Scientific Conference on Security Issues and Counter Terrorism "Problems of Security and Counter Terrorism". Materials. Moscow State University. 2008. P.278-283. (in Russian).
  2. Andrey Chechulin, Igor Kotenko. Investigation of Virus Throttling Defense Mechanisms against Network Worms. Information Security. Inside, ¹3, 2008. P.68-73. (in Russian).
  3. Igor Kotenko, Victor Vorontsov, Andrey Chechulin. Detection and Containment of Spreading malware by means of combined protection mechanisms. ÕVII All-Russian Conference “Methods and technical tools of information security” (MTTIS 2008)”. Proceedings. St.Petersburg, Russia. June 27-29, 2008. (in Russian).
  4. Andrey Chechulin. Defense against Network Attacks by Normalization of Transport and Network Level Protocols of TCP/IP Stack. XI International Conference “Regional informatics-2008” (“RI-2008”). Proceedings. St. Petersburg, October 21-23, 2008. P.115-116. (in Russian).
  5. Igor Kotenko, Victor Vorontsov, Andrey Chechulin. Analysis of Network Worm Detection and Containment Mechanisms. V Interregional Conference “Information Security of Russian Regions (ISRR-2007)”. Selected Proceedings. St.Petersburg, 2008. P.113-119. (in Russian).

2007

  1. Igor Kotenko, Alexander Ulanov, Artem Tishkov, Vitaly Bogdanov, Victor Vorontsov, Andrey Chechulin. Simulation of Network Worm Detection and Containment in Computer Networks. The Third All-Russian Scientific-practical Conference on Simulation and its Application in Science and Industry “Simulation. Theory and Practice (IMMOD-2005)”. St.Petersburg, Russia. October 17-19, 2007. Proceedings. St.Petersburg, 2007. Vol.II. P.106-109. (in Russian).
  2. Andrey Chechulin, Igor Kotenko. Mechanisms of protection against network worms on the basis of threshold random walk method. V St.Petersburg Interregional Conference “Information Security of Russian Regions (ISRR-2007)”. St.Petersburg, Russia. October 23-25, 2007. Conference Proceedings. St.Petersburg, 2007. P.70. (in Russian).
  3. Andrey Chechulin. Investigation of Network Worm Detection and Containment Mechanisms based on Virus Throttling. V St.Petersburg Interregional Conference “Information Security of Russian Regions (ISRR-2007)”. St.Petersburg, Russia. October 23-25, 2007. Conference Proceedings. St.Petersburg, 2007. P.99-100. (in Russian).

2005

  1. Vladimir Platonov, Andrey Chechulin. Defending against network and transport layers attacks. IV Interregional Conference "Information Security of Russia Regions". Selected papers proceedings. St.Petersburg, 2005. P.114-115. (in Russian).

2003

  1. Alexander Rostovtsev, Elena Makhovenko, Alexander Filippov, Andrey Chechulin. On the strength of GOST 28147-89 // Information security problems. Computer systems 2003. ¹2 P.75-83 (in Russian).

Top 

RUSSIA, 199178, Saint-Petersburg, liniya 14-ya, 39, SPIIRAS (metro station Vasileostrovskaya).
+7-(812)-328-7181, +7-(812)-328-2642, ivkote[AT]comsec[DOT]spb[DOT]ru

Comments? Questions? chechulin[AT]comsec[DOT]spb[DOT]ru

Locations of visitors to this page