Izrailov Konstantin EvgenievichTop Main publicationsBooks and Chapters in Books- M.V. Buinevich, K.E. Izrailov. Fundamentals of cybersecurity: methods of protection from program analysis // Textbook for students of higher educational institutions in an enlarged group of specialties and directions "Information security" / St. Petersburg, 2022., 76 ð. // https://elibrary.ru/yfdezh // https://elibrary.ru/item.asp?id=49180160
- S.V. Meshcheryakov, D.A. Shchemelinin, K.E. Izrailov. Principles of organization and monitoring of cloud multiservice systems // Monograph. P. 165, Saint Petersburg, 2022. // https://elibrary.ru/item.asp?id=48508667
- M.V. Buinevich, K.E. Izrailov. Fundamentals of cybersecurity: methods of program analysis // Textbook for students of higher educational institutions in an enlarged group of specialties and directions "Information security" P.92, St. Petersburg, 2022. // https://www.elibrary.ru/item.asp?id=49178863
- T.I. Abdullin, V.D. Baev, M.V. Buinevich, D.D. Burzunov, I.N. Vasilyeva, E.F. Galiullina, U.A. Gatchin, I.G. Gnidenko, N.A. Gorokhov, I.V. Gorstkin, A.B. Dolzhenko, I. V. Egorova, L.A. Enikeeva, V.S. Efimov, A.R. Zhirov, K.E. Izrailov, E.V. Krasilnikova, A.M. Krasnenkov, A.S. Laskus, A. I. Loknov, E.V. Mayorova, O.D. Merdina, S.K. Morozov, V. G. Petrov, A.M. Polegenko, A.A. Prostak, V.N. Rodin, N.A. Savelyeva, V. Salnikov, E.S. Sidorov, N.S. Smirnov, T.V. Smirnova, S.A. Sokolovskaya, A.V. Solodyannikov, V.L. Stelmashonok, E.V. Stelmashonok, V.V. Sukhostat, N.I. Syasin, I.S. Tveritin, D.Yu. Fedorov, V.D. Filippov, G.M. Chernoknizhny, D.I. Yakushev, V.V. Trofimov. Digital Technologies and problems of information security // St. Petersburg State University of Economics. 2021.monograph 163p. // https://elibrary.ru/item.asp?id=45735887
- M.V. Buinevich, K.E. Izrailov, A.V. Krasov. Protection of programs and data. Methods of analysis // Textbook. Federal Communications Agency, Federal State Budgetary Educational Institution of Higher Education "St. Petersburg State University of Telecommunications named after Prof. M. A. Bonch-Bruevich" (SPbSUT). St. Petersburg, 2020. - 72 p., Document code in the NEB 000199_000009_010520755
- M.V. Buinevich, I.N. Vasilyeva, T.M. Vorobyev, I.G. Gnidenko, I.V. Egorova, L.A. Enikeeva, S.G. Zelman, K.E. Izrailov,
S.R. Ishankhanov, V.I. Kuvatov, O.V Loktionov, P.A. Malakhova, O.D. Merdina, A.M. Polegenko, M.A. Popov, A.I. Primakin, T.G. Semenova, S.O. Semenova, A.I. Solov'ev, S.A. Solov'ev, etc. Information protection in computer systems // Saint Petersburg, 2017. Monograph. 163 p.// https://elibrary.ru/item.asp?id=32254007
Papers2024- K.E. Izrailov. The genetic de-evolution concept of program representations. Part 1 // Cybersecurity issues. 2024. No. 1 (59). pp. 61-66. DOI: 10.21681/2311-3456-2024-1-61-66 // https://elibrary.ru/item.asp?id=59932753 (in Russian).
- K.I. Izrailov. Methodology for reverse engineering of machine code. Part 3. Dynamic investigation and documentation // Proceedings of educational institutions of communications. 2024. Vol. 10. No. 1. pp. 86-96. DOI: 10.31854/1813-324X-2024-10-1-86-96 // https://www.elibrary.ru/item.asp?id=62236374 (in Russian).
- K.E. Izrailov. The genetic de-evolution concept of program representations. Part 2 // Cybersecurity issues. 2024. No. 2 (60). pp. 81-86. DOI: 10.21681/2311-3456-2024-2-81-86 // https://elibrary.ru/item.asp?id=65314215 (in Russian).
- K.E. Izrailov. Predicting the size of the source code of a binary program in the interests of its intellectual reverse engineering // Issues of cybersecurity. 2024. No. 4 (62). pp. 13-25. DOI: 10.21681/2311-3456-2024-4-13-25 // https://elibrary.ru/item.asp?id=68490039 (in Russian).
- K.E. Izrailov. Constant values distribution investigation in the c programs source code // Proceedings of educational institutions of communication. 2024. Vol. 10. No. 5. pp. 119-129. DOI: 10.31854/1813-324X-2024-10-5-118-128 // https://elibrary.ru/item.asp?id=74517470 (in Russian).
- K.E. Izrailov, V.E. Mishin, A.V. Shestakov. Overview of attacks on artificial intelligence: monitoring the information security of big data // In the collection: Fire safety: modern challenges. Problems and solutions. Materials of the All-Russian scientific and practical conference. St. Petersburg, 2024. pp. 22-28. // https://elibrary.ru/item.asp?id=67879719 (in Russian).
2023- I. Kotenko, K. Izrailov, M. Buinevich. The Method and Software Tool for Identification of the Machine Code Architecture in Cyberphysical Devices // Journal of Sensor and Actuator Networks. 2023. Vol. 12(1), pp. 11. DOI: 10.3390/jsan12010011. // https://www.elibrary.ru/item.asp?id=60636071
- I. Kotenko, K. Izrailov, M. Buinevich, I. Saenko, R. Shorey. Modeling the Development of Energy Network Software, Taking into Account the Detection and Elimination of Vulnerabilities // Energies. 2023. Vol. 16. Iss. 13. PP. 5111. DOI:10.3390/en16135111 // https://elibrary.ru/item.asp?id=62899231
- Konstantin Izrailov, Nikita Romanov, Andrey Chechulin, Alexander Yaroshenko, Igor Kotenko. Intelligent Selection of Requirements for a Secure Design of Smart City Transport Infrastructure Interfaces // Proceedings of the 16th International Symposium on Intelligent Distributed Computing (IDC-2023). September 13-15, Hamburg, Germany. 2023. P. Pages 135-148
- K.E. Izrailov. Modeling a program with vulnerabilities in the terms of its representations evolution. Part 1. Life cycle scheme // Proceedings of educational institutions of communication. 2023. Vol. 9. No. 1. pp. 75-93. DOI: 10.31854/1813-324X-2023-9-1-75-93 // https://elibrary.ru/item.asp?id=50416979 (in Russian).
- K.E. Izrailov, A.K. Makarova, A.V. Shestakov. Generalized model of protection against cyberattacks on VOIP // Cybersecurity issues. 2023. No. 2 (54). pp. 109-121. DOI: 10.21681/2311-3456-2023-2-109-121 // https://elibrary.ru/item.asp?id=54282358 (in Russian).
- A.V. Yakovlev, E.V. Tarov, K.E. Izrailov, A.A. Chechulin. Method for detecting source code duplicates based on the random walk algorithm // Scientific and analytical journal "Bulletin of the St. Petersburg University of the State Fire Service of the Ministry of Emergency Situations of Russia". 2023. No. 2. P. 134-146. // https://www.elibrary.ru/item.asp?id=54153824 (in Russian).
- E.S. Novikova, I.V. Kotenko, A.V. Meleshko, k.E. Izrailov. federated learning based intrusion detection: system architecture and experiments // Issues of cybersecurity. 2023. No. 6 (58). pp. 50-66. DOI: 10.21681/2311-3456-2023-6-50-66 // https://elibrary.ru/item.asp?id=54966746 (in Russian).
- K.E. Izrailov, M.V. Buinevich. Different genesis attacks to complex objects detecting method based on condition information. Part 1. Prerequisites and schema // Cybersecurity issues. 2023. 3(55). pp. 90-100. DOI: 10.21681/2311-3456-2023-3-90-100 // https://www.elibrary.ru/item.asp?id=54303096 (in Russian).
- K.E. Izrailov. Methodology for machine code reverse engineering. Part 1. Preparation of the research object. // Proceedings of educational institutions of communications. 2023. Vol. 9. No. 5. pp. 79-90. DOI: 10.31854/1813-324X-2023-9-5-79-90 // https://www.elibrary.ru/item.asp?id=54890076 (in Russian).
- K.E. Izrailov. Methodology for machine code reverse engineering. Part 2. Static investigation //Proceedings of educational institutions of communication. 2023. Vol. 9. No. 6. pp. 68-82. DOI: 10.31854/1813-324X-2023-9-6-68-82 // https://www.elibrary.ru/item.asp?id=56946396 (in Russian).
- K.E. Izrailov. Modeling a program with vulnerabilities in the terms of its representations evolution. Part 2. Analytical model and experiment // Proceedings of educational institutions of communications. 2023. Vol. 9. No. 2. pp. 95-111. DOI: 10.31854/1813-324X-2023-9-2-95-111 // https://www.elibrary.ru/item.asp?id=53927921 (in Russian).
- A.V. Yakovlev, K.E. Izrailov. Survey of existing methods for detecting source code duplicates //National security and strategic planning. 2023. No. 1 (41). pp. 86-92. DOI: 10.37468/2307-1400-2023-1-86-92 // https://www.elibrary.ru/item.asp?id=54391110 (in Russian).
- P.A. Kurta, K.E. Izrailov. Survey of methods for building dynamic adaptive interfaces and their intelligentalization // Scientific and analytical journal "Bulletin of the St. Petersburg University of the State Fire Service of the Ministry of Emergency Situations of Russia". 2023. No. 4. pp. 119-132. DOI: 10.61260/2218-130X-2024-2023-4-119-132 // https://www.elibrary.ru/item.asp?id=60051397 (in Russian).
- K.E. Izrailov, M.V. Buinevich. Different genesis attacks to complex objects detecting method based on condition information. Part 2. Algorithm, model and experiment // Issues of cybersecurity. 2023. No. 4 (56). pp. 80-93. DOI: 10.21681/2311-3456-2023-4-80-93 // https://www.elibrary.ru/item.asp?id=54707376 (in Russian).
- K.E. Izrailov, N.A. Ponomarev, E.V. Tarkhov. Analysis of time series forecasting models for predicting trends in the development of information security threats // Actual problems of infotelecommunications in science and education (APINO-2023). XII International scientific-technical and scientific-methodological conference; collection of scientific articles in 4 volumes / Edited by S.I. Makarenko; comp. V.S. Elagin, E.A. Anikevich. – St. Petersburg: SPbSUT. 2023. 1. pp. 572-577 // https://www.elibrary.ru/item.asp?id=54033645 (in Russian).
- K.E. Izrailov, I.V. Umaraliev. A hypothetical method of recovery of machine code architecture modules to identify high-level vulnerabilities // Actual problems of infotelecommunications in science and education (APINO-2023). XII International Scientific, technical and scientific-methodological conference; collection of scientific articles in 4 volumes / Edited by S.I. Makarenko; comp. V.S. Elagin, E.A. Anikevich. – St. Petersburg: SPbGUT. 2023. 1. pp. 577-581 // https://elibrary.ru/item.asp?id=54033646&pff=1 (in Russian).
- K.E. Izrailov, A.Yu. Yaroshenko. Investigation of the machine learning opportunities for automatic ranking of vulnerabilities according to their text description // Actual problems of infotelecommunications in science and education (APINO-2023). XII International Scientific, technical and scientific-methodological conference; collection of scientific articles in 4 volumes / Edited by S.I. Makarenko; comp. V.S. Elagin, E.A. Anikevich. – St. Petersburg: SPbGUT. 2023. 1. pp. 586-590 // https://elibrary.ru/item.asp?id=54033648&pff=1 (in Russian).
- K.E. Izrailov, E.I. Chasovskikh. Comparative analysis of security solutions from unauthorized software distribution // Actual problems of infotelecommunications in science and education (APINO-2023). XII International scientific-technical and scientific-methodological conference; collection of scientific articles in 4 volumes / Edited by S.I. Makarenko; comp. V.S. Elagin, E.A. Anikevich. – St. Petersburg: SPbGUT. 2023. 1. pp. 581-586 // https://elibrary.ru/item.asp?id=54033647&pff=1 (in Russian).
- L.R. Elizarova, K.E. Izrailov. Classification of information security areas using categorical division // Actual problems of infotelecommunications in science and education (APINO-2023). XII International scientific-technical and scientific-methodological conference; collection of scientific articles in 4 volumes / Edited by S.I. Makarenko; comp. V.S. Elagin, E.A. Anikevich. – St. Petersburg: SPbSUT. 2023. 1. pp. 475-479 // https://elibrary.ru/item.asp?id=54033624&pff=1 (in Russian).
2022- Igor Kotenko, Konstantin Izrailov, Michael Buinevich. Static analysis of information systems for iot cyber security: a survey of machine learning approaches // Sensors. 2022. Vol. 22. ¹ 4, Ïîðÿäêîâûé íîìåð: 1335. DOI: 10.3390/s22041335 // https://elibrary.ru/item.asp?id=48149031
- Igor Kotenko, Konstantin Izrailov, Michael Buinevich. Analytical modeling for identification of the machine code architecture of cyberphysical devices in smart homes // Sensors. 2022. Ò. 22. ¹ 3. Serial number: 1017, DOI: 10.3390/s22031017 // https://elibrary.ru/item.asp?id=48145501
- Anton Chudakov, Konstantin Izrailov, Igor Kotenko I.V. Discussion paper: forecasting the possibilitiesof non-euclidan geometry in information security // Informatization and Communications. 2022. No. 3. pp. 15-21. DOI: 10.34219/2078-8320-2022-13-3-15-21 // https://elibrary.ru/item.asp?id=49389506 (in Russian).
- K.E. Izrailov, M.V. Buinevich, I.V. Kotenko, V.A. Desnitsky. Assessment and prediction of the complex objects state: application for information security // Issues of cybersecurity. 2022. No. 6 (52). pp. 2-21. DOI: 10.21681/23113456-6-2022-2-21 // https://elibrary.ru/item.asp?id=59158946 // https://elibrary.ru/item.asp?id=50329071 (in Russian).
- M.V. Buinevich, K.E. Izrailov, V.V. Pokusov, N.E. Romanov. A method of variable classification of vulnerabilities in software code. Part 2. Automation based on machine learning // Automation in industry. 2022. No. 4. pp. 49-55. DOI: 10.25728/avtprom.2022.04.10 // https://elibrary.ru/item.asp?id=48272977 (in Russian).
- K. Izrailov, M. Buinevich, I. Kotenko, V. Desnitsky. Assessment and prediction of the complex objects state: applicatioin for information security // Voprosy Kiberbezopasnosti. 2022. ¹ 6(52). Ñ. 2-21. DOI: 10.21681/2311-3456-2022-6-2-21 // https://elibrary.ru/item.asp?id=59158946
(in Russian).
- Ksenia Zhernova, Konstantin Izrailov, Maxim Kolomeets, Dmitry Levshun, Andrey Chechulin. Conceptual model of the "system-operator" interaction interface based on visualization technologies that take into account the human cognitive apparatus // In the collection: Actual problems of infotelecommunications in science and education (APINO 2022). XI International Scientific-technical and scientific-methodical conference. St. Petersburg, 2022. pp. 460-463. // https://elibrary.ru/item.asp?id=49522737 (in Russian).
- K.E. Izrailov, N.E. Romanov. Application of a genetic algorithm for reverse engineering of machine code // In the collection: Actual problems of infotelecommunications in science and education (APINO 2022). Collection of scientific articles of the XI International scientific-technical and scientific-methodical conference. St. Petersburg, 2022. pp. 239-243. // https://elibrary.ru/item.asp?id=49588777 (in Russian).
- K.E. Izrailov, P.A. Kurta. Vulnerability modeling in smart city transport infrastructure interfaces // In the book: Materials of the conference "Information Technologies in Management" (ITU-2022). 15th Multi-conference on Management Issues. Abstracts of the report at the conference, St. Petersburg, 2022. pp. 237-240. // https://elibrary.ru/item.asp?id=50211049 (in Russian).
2021- Konstantin Izrailov, Michael Buinevich, Igor Kotenko, À. Yaroshenko. Identifying characteristics of software vulnerabilities by their textual description using machine learning // Â ñáîðíèêå: World Automation Congress Proceedings. Ñåð. "2021 World Automation Congress, WAC 2021" 2021. Ñ. 186-192. DOI: 10.23919/WAC50355.2021.9559470 // https://elibrary.ru/item.asp?id=47513415
- V.K. Fedorov, E.G. Balenko, N.V. Gololobov, K.E. Izrailov. Testing platform invoke as a tool for shellcode injection in windows applications // Â ñáîðíèêå: Journal of Physics: Conference Series. Ñåð. "International Conference on Automatics and Energy, ICAE 2021" 2021. Ñ. 012048. DOI: 10.1088/1742-6596/2096/1/012048 // https://elibrary.ru/item.asp?id=47547489
- Konstantin Izrailov, Dmitry Levshun, Andrey Chechulin. Vulnerability classification model for Smart City transport infrastructure interfaces. Systems of Control, Communication and Security, 2021, no. 5, pp. 199-223. DOI: 10.24412/2410-9916-2021-5-199-223 // https://elibrary.ru/item.asp?id=47141867 (in Russian).
- M.V. Buinevich, V.V. Pokusov, K.E. Izrailov. Threats model of information and technical interaction in the integrated information protection system // Informatization and communication. 2021. No. 4. pp. 66-73. DOI: 10.34219/2078-8320-2021-12-4-66-73 // https://elibrary.ru/item.asp?id=46166157 (in Russian).
- K.E. Izrailov. Generalized classification of vulnerabilities of interfaces to the transport infrastructure of the Smart city // Information Technologies. 2021. Vol. 27. No. 6. pp. 330-336. DOI: 10.17587/it.27.330-336 // https://elibrary.ru/item.asp?id=46264778
(in Russian).
- N.E. Romanov, K.E. Izrailov, V.V. Pokusov. Intelligent Programming Support System: Machine Learning FEAT. fast development of secure programs // Informatization and Communications. 2021. No. 5. pp. 7-16. DOI: 10.34219/2078-8320-2021-12-5-7-16 // https://elibrary.ru/item.asp?id=46659846
(in Russian).
- M.V. Buinevich, K.E. Izrailov, V.V. Matveev, V.V. Pokosov. Method of variable classification of vulnerabilities in software code. Part 1. Stratification and categorical division // Automation in industry. 2021. No. 11. pp. 42-49. DOI: 10.25728/avtprom.2021.11.09 // https://elibrary.ru/item.asp?id=47189511 (in Russian).
- K.E. Izrailov. Genetic decompilation concept of the telecommunication devices machine code // Proceedings of educational institutions of communications. 2021. Vol. 7. No. 4. pp. 95-109. DOI: 10.31854/1813-324X-2021-7-4-95-109 // https://elibrary.ru/item.asp?id=47488978 (in Russian).
- M.V. Buinevich, K.E. Izrailov, V.V. Pokusov V.V. Language of the program code uniform presentation for searching medium- and high-level vulnerabilities: the basic provisions of paradigm // Cybersecurity issues. 2021. No. 6 (46). pp. 78-89. DOI: 10.21681/2311-3456-2021-6-78-89 // https://elibrary.ru/item.asp?id=47327015 (in Russian).
- M.A. Skorykh, K.E. Izrailov, A.V. Bashmakov. Task oriented comparison of network traffic analysis tools // In the collection: Theory and practice of information security. Collection of scientific papers based on the materials of the All-Russian scientific and theoretical conference. 2021. pp. 103-107. // https://elibrary.ru/item.asp?id=49246459 (in Russian).
- M.V. Buinevich, K.E. Izrailov, A.A. Krivenko. Cybersecurity gaming training systems: review and criteria comparison // Bulletin of the St. Petersburg State University of Technology and Design. Series 1: Natural and Technical Sciences. 2021. No. 4. pp. 5-13. DOI: 10.46418/2079-8199_2021_4_1 // https://elibrary.ru/item.asp?id=47935485 (in Russian).
- K.E. Izrailov, V.V. Pokusov. Software platform architecture for converting machine code into a high-level representation for expert search of vulnerabilities // Electronic network polythematic journal "Scientific works of KubSTU". 2021. No. 6. pp. 93-111. // https://elibrary.ru/item.asp?id=47970524 (in Russian).
- N.V. Gololobov, K.E. Izrailov. Investigating a way to call an insecure kernel API on Windows OS // In the collection: Actual problems of infotelecommunications in science and education. collection of scientific articles: in 4 volumes. St. Petersburg State University of Telecommunications named after Prof. M.A. Bonch-Bruevich. Saint Petersburg, 2021. Vol.1, pp. 248-252. // https://elibrary.ru/item.asp?id=46275402
(in Russian).
- K.E. Izrailov, V.V. Pokusov. Creation of a software object-oriented platform for the development of UEFI modules // Actual problems of infotelecommunications in science and education (APINO-2021). X Anniversary International scientific-technical and scientific-methodical conference; collection of scientific articles in 4 vol. 2021. Volume 2. pp. 246-250 https://www.sut.ru/doci/nauka/1AEA/APINO/10-APINO-2021.Ò.2.pdf // https://elibrary.ru/item.asp?id=46545667 (in Russian).
- M.V. Buinevich, K.E. Izrailov, V.V. Pokusov, A.Yu. Yaroshenko. On the architecture of complex and integrated security systems: protocol-oriented approach // In the collection: Current problems of protection and security. Proceedings of the XXIV All-Russian Scientific and Practical Conference RARAN. Moscow, 2021. pp. 377-383. // https://elibrary.ru/item.asp?id=47472530 (in Russian).
- K.E. Izrailov. Improving the interfaces of specialized mobile applications of the Ministry of Emergency Situations of Russia // In the collection: Transport of Russia: problems and prospects - 2021. Materials of the International Scientific and Practical Conference. Saint Petersburg, 2021. pp. 82-88. // https://elibrary.ru/item.asp?id=48702890 (in Russian).
2020- Kotenko Igor, Krasov Andrey, Ushakov Igor and Izrailov Konstantin. Detection of Stego-Insiders in Corporate Networks Based on a Hybrid NoSQL Database Model // ACM International Conference Proceeding Series. 4. Ñåð. "Proceedings of the 4th International Conference on Future Networks and Distributed Systems, ICFNDS 2020" 2020. Ñ. 3442612. DOI: 10.1145/3440749.3442612 // https://elibrary.ru/item.asp?id=46072420
- K. Izrailov, A. Chechulin, L. Vitkova. Threats classification method for the transport infrastructure of a smart city // Â ñáîðíèêå: 14th IEEE International Conference on Application of Information and Communication Technologies, AICT 2020 - Proceedings. 14. 2020. Ñ. 9368828. DOI: 10.1109/AICT50176.2020.9368828 // https://www.elibrary.ru/item.asp?id=46760875
- M. Buinevich, K. Izrailov, G. Ganov. Intellectual method of program interactions visualisation in unix-like systems for information security purposes // Â ñáîðíèêå: CEUR Workshop Proceedings. 12. Ñåð. "MICSECS 2020 - Proceedings of the 12th Majorov International Conference on Software Engineering and Computer Systems" 2020. Ñ. 59-71.// https://www.elibrary.ru/item.asp?id=46875073
- M. V. Buinevich, K. E. Izrailov, V. V. Pokusov, V. A. Taylakov, I. N. Fedulina An intelligent method of machine code algorithmization for vulnerabilities search // Information Security. Insider. 2020. No. 5 (95). pp. 57-63 // https://www.elibrary.ru/item.asp?id=44133751 (in Russian).
- M.V. Buynevich, K. E. Izrailov. Analytical modeling of the vulnerable program code execution // Cybersecurity. 2020. No. 3(37). pp. 2-12. DOI: 10.21681/2311-3456-2020-03-02-12 // https://www.elibrary.ru/item.asp?id=43976791 (in Russian).
- M.V. Buinevich, K.E. Izrailov. Identification of processor’s architecture of executable code based on machine learning. Part 1. Frequency byte model // Proceedings of educational institutions of communication. 2020. Vol.6 No. 1. pp. 77-85. DOI: 10.31854/1813-324X-2020-6-1-77-85 // https://www.elibrary.ru/item.asp?id=42752699
(in Russian).
- M.V. Buinevich, K.E. Izrailov. Identification of processor’s architectureof executable code based on machine learning.Part 2. Identification method // Proceedings of educational institutions of communication. 2020. Vol. 6 No. 2. pp. 104-112. DOI: 10.31854/1813-324X-2020-6-2-104-112 // https://www.elibrary.ru/item.asp?id=43084686
(in Russian).
- M.V. Buinevich, K.E. Izrailov. Identification of processor’s architecture of executable code based on machine learning. Part 3. Assessment quality and applicability border // Proceedings of educational institutions of communication. 2020. Vol. 6 ¹ 3. pp. 48-57. DOI: 10.31854/1813-324X-2020-6-3-48-57 // https://www.elibrary.ru/item.asp?id=44012810
(in Russian).
- M.V. Buynevich, K.E. Izrailov. Generalized model of static analysis of program code based on machine learning in relation to the problem of vulnerability search // Informatization and Communication. 2020. No. 2. pp. 143-152. DOI: 10.34219/2078-8320-2020-11-2-143-152 // https://www.elibrary.ru/item.asp?id=42976426 (in Russian).
- M.V. Buinevich, K.E. Izrailov. Method for classification of files on the basis of machine training technology // Bulletin of the St. Petersburg State University of Technology and Design. Series 1: Natural and Technical Sciences. 2020. No. 1. Ð. 34-41 DOI: 10.46418/2079-8199_2020_1_6 // https://www.elibrary.ru/item.asp?id=43121338 (in Russian).
- Yu.N. Bolshakov, M.J. Bolshakov, K.E. Izrailov, A.V. Romanenko. Visualization of information exchange in the context of Industry 4.0 vision // Automation in industry. 2020. No. 8. pp. 23-29. DOI: 10.25728/avtprom. 2020. 08. 06 // https://www.elibrary.ru/item.asp?id=43836926 (in Russian).
- K.E. Izrailov. Visualization of many featured software vulnerabilities using the principal component analysis // Bulletin of the St. Petersburg State University of Technology and Design. Series 1: Natural and Technical Sciences. 2020. ¹ 1. Ð. 3-8. DOI: 10.46418/2079-8199_2020_1_1 // https://www.elibrary.ru/item.asp?id=43121333 (in Russian).
- K.E. Izrailov. Applying of genetic algorithms to decompile machine code // Information Protection. Insider. 2020. No. 3(39). pp. 24-30 // https://www.elibrary.ru/item.asp?id=42976228 (in Russian).
- K.E. Izrailov, AI. Obrezkov. An approach to identifying the sequence of single-target network attacks with visualization of their progress to an expert // Methods and technical means of ensuring the security of information. 2020. No. 29. P. 68-69 // https://www.elibrary.ru/item.asp?id=44017276 (in Russian).
- M.V. Buinevich, G.A. Khanov, K.E. Izrailov. Intellectual method of programs interactions visualization for information security audit of the operating system // Informatization and Communications. 2020. No. 4. pp. 67-74. DOI: 10.34219/2078-8320-2020-11-4-67-74 // https://www.elibrary.ru/item.asp?id=44312282 (in Russian).
- M.V. Buinevich, K.E. Izrailov, V.V. Pokusov, A.Yu. Yaroshenko. Main principles of designing the modern protection systems architecture // National security and strategic planning. 2020. No. 3 (31). pp. 51-58. DOI: 10.37468/2307-1400-2020-3-51-58 // https://www.elibrary.ru/item.asp?id=44342138 (in Russian).
- K.E. Izrailov, P.E. Zhukovskaya, P.A. Kurta, A.A.Chechulin. Research of the method for determining the password resistance to brute force on the basis of an artificial neural network // In the collection: Information technologies in management. conference materials. Saint Petersburg, 2020. pp. 273-276. // https://www.elibrary.ru/item.asp?id=44686239 (in Russian).
- L.A. Vitkova, K E. Izrailov, A A. Chechulin. Classification of vulnerability of interfaces transport infrastructure of a smart city // IX International scientific-technical and scientific-methodological conference " Actual problems of infotelecommunications in science and education "(APINO-2020)". February 26-27, 2020. Collection of scientific articles. 2020. Vol. 1. P. 253-258. // https://www.elibrary.ru/item.asp?id=44604006&pff=1 (in Russian).
- K. E. Izrailov, K. N. Zhernova. Intellectual methods of classification of a smart city transport infrastructure // Perspective directions of development of domestic information technologies: materials of the VI Interregional scientific and practical conference, Sevastopol, September 22-26, 2020, pp. 160-161 http://www.spoisu.ru/files/pnroit/pnroit-2020_materials.pdf // https://elibrary.ru/item.asp?id=45844789
(in Russian).
- K.E. Izrailov, S.A. Kuznetsov. The use of artificial intelligence and machnie learning methods to search for vulnerabilities in source code // In the collection: Actual problems of infotelecommunications in science and education (APINO 2020). Collection of scientific articles of the IX International Scientific-technical and scientific-methodical Conference. In 4 volumes. St. Petersburg, 2020. pp. 361-366. // https://www.elibrary.ru/item.asp?id=44610403 (in Russian).
- K.E. Izrailov, I.M. Tatarnikova, A.V. Fedorova, V.Yu. Shiryaev. Comparative analysis of plagiarism checkers // In the collection: Actual problems of infotelecommunications in science and education (APINO 2020). Collection of scientific articles of the IX International Scientific-technical and scientific-methodical Conference. In 4 volumes. St. Petersburg, 2020. pp. 366-371.// https://www.elibrary.ru/item.asp?id=44610404 (in Russian).
2019- K.E. Izrailov, N.V. Gololobov, G.A. Raskin. Method of malware analysis based on FUZZY HASH // Informatization and Communication 2019. No. 2. pp. 36-44. DOI: 10.34219/2078-8320-2019-10-2-36-44 // https://elibrary.ru/item.asp?id=37576030 (in Russian).
- M.V. Buinevich, K.E. Izrailov. Anthropomorphic approach to description of the vulnerabilities interaction in program code. Part 1. Types of interactions // Information protection. Inside. 2019. No. 5 (89). pp. 78-85. // https://elibrary.ru/item.asp?id=41221386 (in Russian).
- M.V. Buinevich, K.E. Izrailov. Anthropomorphic approach to description of the vulnerabilities interaction in program code. Part. 2. Metric of vulnerabilities // Information protection. Inside. 2019. No. 6 (90). pp. 61-65. // https://elibrary.ru/item.asp?id=41494732 (in Russian).
- M.V. Buinevich, P.E. Zhukovskaya, K.E. Izrailov, V.V. Pokusov. Application of machine training to search vulnerabilities in the software code // Information technologies and telecommunications. 2019. Vol. 7. No. 4. pp. 59-65.DOI: 10.31854/2307-1303-2019-7-4-50-56 // https://elibrary.ru/item.asp?id=43921815 (in Russian).
- K.E. Izrailov, I.M. Tatarnikova. An approach to analyzing the security of a software code from the standpoint of its form and content // In the collection: Actual problems of infotelecommunications in science and education (APINO 2019). collection of scientific articles of the VIII International Scientific-technical and Scientific-methodological Conference: in 4 t.. 2019. pp. 462-467. // https://elibrary.ru/item.asp?id=41383575 (in Russian).
2018- M.V. Buinevich, K.E. Izrailov, V.V. Pokusov,S.V. Sharapov, S.N. Terekhin. Generalized interaction model in the information system // International Journal of Pure and Applied Mathematics. 2018. Ò. 119. ¹ 17. Ñ. 1381-1385. // https://elibrary.ru/item.asp?id=35321842
- M. Buinevich, K. Izrailov, E. Stolyarova, A. Vladyko. Combine method of forecasting vanet cybersecurity for application of high priority way // Â ñáîðíèêå: 2018 20th International Conference on Advanced Communication Technology (ICACT). conference proceedings. 2018. Ñ. 266-271. DOI: 10.23919/ICACT.2018.8323720 // https://elibrary.ru/item.asp?id=35063552
- M.V. Buinevich, V.V. Pokusov, K.E. Izrailov. Method of visualizing the modules of the information security system // Scientific and Analytical journal "Bulletin of the St. Petersburg University of the State Fire Service of the Ministry of Emergency Situations of Russia". 2018. No. 3. pp. 81-91. // https://elibrary.ru/item.asp?id=36263686 (in Russian).
- M.V. Buinevich, V.V. Pokusov, K.E. Izrailov. Interaction effects of enterprise providing subsystems of information service (as example is used fire safety service) // Scientific and Analytical journal "Bulletin of the St. Petersburg University of the State Fire Service of the Ministry of Emergency Situations of Russia". 2018. No. 4. pp. 48-55. // https://elibrary.ru/item.asp?id=37272518 (in Russian).
- V.A.Tailakov, K.E. Izrailov. Methods of automating the search for vulnerabilities in software at the appropriate levels of its development // Scientific aspect. 2018. Vol. 6. No. 4. pp. 719-726.// https://elibrary.ru/item.asp?id=36942713 (in Russian).
- K.E. Izrailov, V.V. Pokusov, E.S. Stolyarova. Information objects in the system of ensuring information security // In the collection: Theoretical and applied issues of complex security. Materials of the I International Scientific and Practical Conference. Petrovsky Academy of Sciences and Arts. 2018. pp. 166-169. // https://elibrary.ru/item.asp?id=34924831 (in Russian).
2017- M. Buinevich, K. Izrailov, A. Vladyko. Testing of utilities for finding vulnerabilities in the machine code of telecommunication devices // Â ñáîðíèêå: 2017 19th International Conference on Advanced Communication Technology (ICACT). 19, Opening Era of Smart Society. Ñåð. "19th International Conference on Advanced Communications Technology: Opening Era of Smart Society, ICACT 2017 - Proceeding" 2017. Ñ. 408-414. DOI: 10.23919/ICACT.2017.7890122 // https://elibrary.ru/item.asp?id=28900838
- K.E. Izrailov. A system of criteria for evaluating methods to search for vulnerabilities and a metric of comprehensibility of program code representation // Informatization and communication. 2017. No. 3. pp. 111-118 // https://elibrary.ru/item.asp?id=29108491 (in Russian).
- K.E. Izrailov, V.V. Pokusov. Actual issues of interaction of elements of complex information security systems // In the collection: Actual problems of infotelecommunications in science and education. collection of scientific articles: in 4 volumes. Edited by S.V. Bachevsky. 2017. pp. 255-260. // https://elibrary.ru/item.asp?id=32650680 (in Russian).
- A.A. Biryukov, K.E. Izrailov. The comparative analysis of models of threats of information security for the benefit of applicability for multi-stage schemes of the attacks // In the collection: Actual problems of infotelecommunications in science and education (APINO 2017). Collection of scientific articles of the VI International Scientific-technical and scientific-methodical Conference. In 4 volumes. Edited by S.V. Bachevsky. 2017. pp. 108-112. // https://elibrary.ru/item.asp?id=32578093 (in Russian).
2016- M. Buinevich, K. Izrailov, A. Vladyko. Method and prototype of utility for partial recovering source code for low-level and medium-level vulnerability search // Â ñáîðíèêå: 2016 18th International Conference on Advanced Communication Technology (ICACT). 2016. Ñ. 700-707. DOI: 10.1109/ICACT.2016.7423603 // https://elibrary.ru/item.asp?id=25873415
- K. E. Izrailov, V.V. Pokusov. Utility for vulnerability search in a software of telecommunication devices by method algoritmization of machine code. Part 3. Modular-algorithmic architecture // Information technology and telecommunications. 2016. Vol. 4. No. 4. pp. 104-121. // https://elibrary.ru/item.asp?id=29041144 (in Russian).
- M.V Buinevich M.V., K.E. Izrailov, D.I. Mostovich, A.Yu. Yaroshenko. Problematic issues of neutralization of vulnerabilities in a software code of telecommunication devices // Problems of risk management in the technosphere. 2016. No. 3 (39). pp. 81-89.// https://elibrary.ru/item.asp?id=27162851 (in Russian).
- M.V. Buinevich, K.E. Izrailov. Utility for vulnerability search in a software of telecommunication devices by method algoritmization of machine code. Part 1. Functional architecture // Information technologies and telecommunications. 2016. Vol. 4. No. 1. pp. 115-130. // https://elibrary.ru/item.asp?id=26191560 (in Russian).
- K.E. Izrailov. Utility for vulnerability search in software of telecommunication devices by method algorithmization of machine code. Part 2. Information architecture // Information technologies and telecommunications. 2016. Vol. 4. No. 2. pp. 86-104. // https://elibrary.ru/item.asp?id=27468771 (in Russian).
- M.V. Buinevich, K.E. Izrailov. Categorical synthesis and technological analysis of security import substitution variants of telecommunication devices software // Information technologies and telecommunications. 2016. Vol. 4. No. 3. pp. 95-106.// https://elibrary.ru/item.asp?id=28384815 (in Russian).
- M.V. Buinevich, K.E. Izrailov, D.I. Mostovich. Comparative analysis of approaches to finding vulnerabilities in software code // In the collection: Actual problems of infotelecommunications in science and education. collection of scientific articles of the V International scientific-technical and scientific-methodical conference. 2016. pp. 256-260. // https://www.elibrary.ru/item.asp?id=27296306 (in Russian).
2015- M.V. Buinevich, O.V. Shcherbakov, A.G. Vladyko, K.E. Izrailov. Architectural vulnerability models of networks // Scientific and Analytical journal "Bulletin of the St. Petersburg University of the State Fire Service of the Ministry of Emergency Situations of Russia". 2015. No. 4. pp. 86-93. // https://elibrary.ru/item.asp?id=25294888 (in Russian).
- K.E. Izrailov. Search for vulnerabilities in various representations of machine code // In the book: Information Security of the regions of Russia (IBRR-2015). Conference materials. 2015. p. 157. // https://elibrary.ru/item.asp?id=28771243 (in Russian).
2014- M. Buinevich, K. Izrailov. Method and utility for recovering code algorithms of telecommunication devices for vulnerability search // Â ñáîðíèêå: 16th International Conference on Advanced Communication Technology. 2014. Ñ. 172-176. DOI: 10.1109/ICACT.2014.6778943 // https://elibrary.ru/item.asp?id=26914430
- M.V. Buinevich, K.E. Izrailov, O.V. Shcherbakov. Model of machine code specialized for vulnerabilities search // Bulletin of the Voronezh Institute of GPS of the Ministry of Emergency Situations of Russia. 2014. No. 2 (11). pp. 46-51. // https://elibrary.ru/item.asp?id=21574302 (in Russian).
- M.V. Buinevich, O.V. Shcherbakov, K.E. Izrailov. Structural model of machine code specialized for search for software vulnerabilities of the automated control systems // Problems of risk management in the technosphere. 2014. No. 3 (31). pp. 68-74. // https://elibrary.ru/item.asp?id=22553713 (in Russian).
- K.E. Izrailov. Methods of assessing the effectiveness of medium of algorithmization used to find vulnerabilities // Informatization and Communication. 2014. No. 3. pp. 44-47. // https://elibrary.ru/item.asp?id=22531534 (in Russian).
- K.E. Izrailov. Method and software tool for restoring algorithms of machine code of telecommunication devices to search for vulnerabilities // In the collection: Regional informatics "RI-2014". Materials of the XIV St. Petersburg International Conference. 2014. pp. 140-141. // https://elibrary.ru/item.asp?id=28771217 (in Russian).
2013- M.V. Buinevich, K.E. Izrailov. Automated means of algorithmization of machine code of telecommunication devices // Telecommunications. 2013. No. 6. pp. 2-9. // https://elibrary.ru/item.asp?id=19084251 (in Russian).
- K.E. Izrailov. Algorithmization machine code of telecommunications devices as a strategic means for information security // National security and strategic planning. 2013. No. 2 (2). pp. 28-36.// https://elibrary.ru/item.asp?id=20234442 (in Russian).
- K.E. Izrailov. Analysis of the security state of software // In the collection: Actual problems of infotelecommunications in science and education. II International Scientific-technical and scientific-methodical conference. 2013. pp. 874-877. // https://elibrary.ru/item.asp?id=21939827 (in Russian).
- K.E. Izrailov. C-language extensionfor algorithm description of telecommunicationdevices code // Information technologies and telecommunications. 2013. Vol. 1. No. 2. pp. 21-31. // https://elibrary.ru/item.asp?id=21133498 (in Russian).
- K.E. Izrailov, A.Yu. Vasilyeva, A.I. Ramazanov. Enlarged assesment method of effectiveness of automated tools, recovering source code in search for vulnerability // Bulletin of the Injecon. Series: Technical Sciences. 2013. No. 8 (67). pp. 107-109.// https://elibrary.ru/item.asp?id=20984314 (in Russian).
- K.E. Izrailov. The internal representation of a prototype utility for the recovery code // Fundamental and applied research in the modern world. 2013. No. 2. pp. 79-90.// https://www.elibrary.ru/item.asp?id=20221280 (in Russian).
- K.E. Izrailov. Architectural software vulnerabilities // In the book: The Sixth Scientific Congress of Students and postgraduates of INJECON-2013. Abstracts of reports. St. Petersburg State University of Economics; Faculty of Law and Economic Security. 2013. p. 35.// https://www.elibrary.ru/item.asp?id=28771079 (in Russian).
2012- M.V. Buinevich, K.E. Izrailov. Method of algorithmization of machine code of telecommunication devices // Telecommunications. 2012. No. 12. pp. 2-6. // https://elibrary.ru/item.asp?id=20807602 (in Russian).
- K. E. Izrailov. Model of forecasting the telecommunication system threats on the basis of the artificial neural network // Bulletin of the Injecon. Series: Technical Sciences. 2012. No. 8 (59). pp. 150-153.// https://www.elibrary.ru/item.asp?id=18244835 (in Russian).
- K.E. Izrailov. Consideration of program code representations from the perspective of metadata // In the collection: Fundamental Research and Innovation in national research Universities. Materials of the All-Russian Scientific and Methodological Conference. 2012. pp. 176-180.// https://elibrary.ru/item.asp?id=28772707 (in Russian).
- K.E. Izrailov, A.Yu. Vasilyeva. Language of description of the telecommunication network security model // In the collection: New Information technologies and Systems (NITiS-2012). Proceedings of the X International Scientific and Technical Conference. 2012. pp. 272-275. // https://elibrary.ru/item.asp?id=28771694 (in Russian).
2009- E.K. Izrailov, Ê.Å. Izrailov. Nanotechnology of creation of quantum points from the ultra-cold atoms of hydrogen. 2009., pp. 1-108--1-112 // http://ets.ifmo.ru/tomasov/konferenc/AutoPlay/Docs/Volume%201/2_10.pdf
Top |
|