| News | Staff | Projects | Awards | Patents | Results | Conferences | Collaboration | ISL ISoCPS | Publications | Events | Matherials |
 | Links | Contacts |
rus | eng |
  


Personal | Interests | Courses | PhD Students | Projects | Results | Activities | Membership | Awards |  Patents and Programms |  Publications | 

Kotenko Igor Vitalievich

Citizenship: Russia
Address academic (office):
St.Petersburg Federal Research Ceneter of the Russian Academy of Sciences
39, 14th Liniya, St.-Petersburg, 199178, Russia
Tel.: +7-(812)-328-2642
Fax: +7-(812)-328-4450
Current position: Head of Laboratory of Computer Security Problems, SPIIRAS
Previous position: Leading Researcher of Intelligent Systems Laboratory, SPIIRAS

Igor Vitalievich Kotenko, Prof. of Computer Science, Head of Laboratory of Computer Security Problems, St.Petersburg Federal Research Ceneter of the Russian Academy of Sciences. Graduated with honors from St. Petersburg Academy of Space Engineering (Department of Telecommunication and Computer-Aided Systems) (1983) and St. Petersburg Signal Academy (Department of Computer-Aided systems) (1987), received his Ph.D. degree (1990) and Doctor of Technical Sciences degree (1999) in the area "Telecommunication Systems Control", professor of computer science since 2001. Main publications are related to the areas of Computer network security, Artificial intelligence, Multi-agent systems, Telecommunication systems control, Computer-aided decision support.

E-mail: ivkote[AT]comsec[DOT]spb[DOT]ru
http://comsec.spb.ru/kotenko/

Top 

Research interests

  • Computer network security, including security policy management, access control, authentication, network security analysis, intrusion detection, firewalls, deception systems, malware protection, verification of security systems, digital right management, modeling, simulation and visualization technologies for counteraction to cyber terrorism;
  • Artificial intelligence, including multi-agent frameworks and systems, agent-based modeling and simulation, soft and evolutionary computing, machine learning, data mining, data and information fusion;
  • Telecommunications, including decision making and planning for telecommunication systems.

Top 

Courses Taught

Taught a multitude of graduate and undergraduate courses at the St.-Petersburg Signal Academy, and St.-Petersburg Herzen State Pedagogical University:
  • Informatics, Computer-aided Systems,
  • Computer-Aided Decision Support,
  • Applied Mathematics,
  • Programming Languages,
  • Software Development,
  • Databases,
  • Discrete Mathematics,
  • Internet Technologies,
  • Control Theory in Military Systems,
  • Information and Network Security,
  • etc.

Top 

PhD Students

Research directions of PhD Students:
  • Bogdanov Vitaly Sergeevich - "Models and a technique of proactive monitoring of security policy performance in computer networks";
  • Branitskiy Alexander Alexandrovich - Detection and classification of network attacks on the basis of the hybridization of computational intelligence methods;
  • Chechulin Andrey Alexeevich Design and analysis of computer network attack trees taking into account the requirements of operativeness (Specialty: 05.13.19 Methods and systems of information security, information assurance). Defense date - December 25, 2013.;
  • Desnitsky Vasiliy Alexeevich - Configuring of secure embedded devices based on resource indicators (Specialty: 05.13.19 Methods and systems of information security, information assurance). Defense date June 25, 2013. Supervisor Igor Kotenko.;
  • Doynikova Elena Vladimirovna - "Determining security risks of computer networks on the base of attack graph analysis";
  • Fedorchenko Andrey Vladimirovich - Correlation of big heterogeneous data for SIEM in cyber-physical systems;
  • Sidelnikova Ekaterina Viktorovna - "Detection and resolution of security policy conflicts on the basis of event calculus";
  • Polubelova (Chervatuk) Olga Vitalievna - Verification of filtering rules of firewalls based on application of Model Checking (Specialty: 05.13.19 Methods and systems of information security, information assurance). Defense date - June 25, 2013.;
  • Komashinskiy Dmitry Vladimirovich Techniques to identify potentially malicious file objects based on data mining (Specialty: 05.13.19 Methods and systems of information security, information assurance). Defense date - December 25, 2013. ;
  • Komashinsky Nickolay Aleksandrovitch - Target attacks detection based on the combination of signature analysis and big data technologies;
  • Konovalov Aleksey Michailovich Modeling and simulation of network attacks and defense mechanisms against them;
  • Merkushev Eugene Sergeevich - Information security in implementation of federative cloud computing;
  • Pronoza Anton Alexandrovich - Big heterogeneous data visualization for incident management and target cyber-physical attacks prevention;
  • Reznik Sergey Pavlovich Verification of security protocols;
  • Shorov Andrey Vladimirovich - Simulation of mechanisms for the protection of computer networks from infrastructural attacks on the base of the approach "Nervous system of the network (Specialty: 05.13.19 Methods and systems of information security, information assurance). Defense date April 17, 2012;
  • Stepashkin Mikhail Viktorovich Models and a technique of computer networks security analysis on the basis of attack graph construction;
  • Ulanov Alexander Vladimirovich Multiagent modelling and simulation of DDoS attacks and protection mechanisms;
  • Ushakov Igor Aleksandrovich - Detection of insiders in computer networks based on a combination of expert rules, machine learning and Big Data processing(Specialty: 05.13.19 Methods and systems of information security, information assurance). Defense date July 02, 2020;
  • Vorontsov Victor Vasilievich Automatic detection and prevention of virus attacks on the basis of combined mechanisms of network traffic restriction.

Top 

The main scientific results received in 2005-2016

  • The formal statement of the research problem and the basic requirements to the components realizing the intelligent security mechanisms and the life cycle support of distributed protected computer systems were offered. The principles of construction, structure and a fragment of the distributed knowledge base for intelligent security mechanisms based on subject domain ontology, and the life cycle support environment of distributed protected computer systems are developed. The formal models of particular components of intelligent security mechanisms and the life cycle support environment of distributed protected computer systems are developed. In particular, the components for the specification of security policies and protected system (network) configuration, security policy verification, determination of security level and monitoring of security policy performance are suggested.
  • The general approach to verification of security policy of corporate computer networks based on hybrid multi-modular architecture of verification system, the models of particular verification components and a verification system software were developed. Using the advantages of multi-modular architecture, the approach allows combining general purpose modules with specialized methods. General purpose modules are constructed on the basis of theorem proving (with use of Event Calculus) and model checking methods. They allow processing the contradictions of various types, including dynamic ones. The specialized methods are directed on more effective processing of contradictions of concrete types.
  • The models of computer attacks and malefactor, attack tree formation and an estimation of computer network security level were developed. As against existing models, the model of computer attacks allows to use for representation of attack actions both expert knowledge and open databases of vulnerabilities. The malefactor model allows taking into account not only the malefactors rights on network computers and the host from which he realizes attack actions, but also the level of knowledge and skills of malefactor, and also his primary knowledge about an attacked network. The important feature of the given models is also the account of malefactors characteristics at attack scripts formation. The model of attack tree formation analyses the dependences of pre-conditions and post-conditions of attack actions. The given model possesses the following features: the attack tree nodes are represented as three , that allows to define the concepts attack trace and threat; at construction of attack tree the network traffic filtering rules which are set on firewalls are obviously taken into account. The model of an estimation of computer network security level uses the Common Vulnerability Scoring System (CVSS) approach for determining the primary security parameters, that considerably simplifies their calculation, and for defining the qualitative integrated security parameter of computer network, the combination of the CVSS approach and the Facilitated Risk Analysis and Assessment Process (FRAAP) techniques of risk analysis is used.
  • The automated technique of detailed analysis of computer network security was developed. It possesses the following features: it uses the uniform approach (based on construction and analysis of attack tree) both for a network design and its operation stages; the basic stages of the technique are automated; the active security analysis software (capable to break the functioning of particular services or a network as a whole) is not used. The developed technique allows: to take into account a variety of initial locations of malefactor, his knowledge about an attacked network; to use for analysis not only computer network configuration, but also the rules of security policy implemented; to take into account various types of attack actions; to use present-day open vulnerabilities databases; to calculate a set of parameters describing computer network security a as a whole and its particular components; to define computer network security bottlenecks, i.e. the hosts responsible for most of attack traces and vulnerabilities; to determine an integrated parameter of network security.
  • The software of computer network security analysis which is based on the offered security analysis models and technique was developed. Carrying out of experiments with test computer networks has shown the serviceability and higher efficiency of this software in comparison with existing similar systems.
  • The models and software prototype of proactive monitoring of security policy performance in computer networks were developed. Offered models of security policy monitoring are based on the active imitation of users actions (both legal and forbidden by security policy) and determining the divergences of system reactions from predefined. As against relevant research, the given approach is applicable to various categories of security policy (authentication, access control and authorization, filtering, channel protection, etc.). The models are based on optimizing the test influence sequence which involves the following aspects: removal of superfluous test influences; finding the optimum test influence sequence; determining the test influence subsequences which can be carried out in parallel. The approach is based on planning and generating a set of scripts for carrying out security policy monitoring, use of the distributed set of scanners, gathering and correlation of the information received from them. The offered models and software components allow carrying out checking the conformity of security policy specified at a design stage, to its realization in real network (system), and also the analysis of adequacy of this policy to the goals of protecting the information resources of computer system from the current security threats.
  • The models of agent teams realizing attacks Distributed Denial of Service (DDoS) and mechanisms of protection against them, and also the models of teams interaction were developed. The models of agent teams differ in use as basis of agent teamwork methods. The peculiarity of these models is applying the procedures of action coordination, monitoring and restoration of agent functionalities, and also communications selectivity. The distinctive features of the models of agent teams interaction: the representation of various kinds of teams interactions which are based on antagonistic counteraction, cooperation and adaptation; the use of various methods of defense agent teams cooperation which allow defense agents to exchange the traffic data and to involve different classes of defense agents; an opportunity of agent teams adaptation by means of generating new exemplars of attacks and defense mechanisms and scripts of their realization.
  • The technique of multiagent simulation of defense mechanisms against DDoS attacks in the Internet (based on the models of agent teams and their interactions) was developed. The peculiarities of the technique: it takes into account the key parameters of investigated processes (the parameters of a network and its hosts, the parameters of attack team and attack realization, the parameters of defense team and defense mechanisms, the parameters of teams interaction, etc.); the basic stages of the technique are automated; on the basis of output parameters the estimation and comparison of various defense mechanisms is made. The developed models and technique can be generalized for solving a big class of problems, in particular, problems of information counteraction in the Internet, competition in sphere of electronic business, etc. The offered technique can be used for investigating the efficiency of various defense mechanisms, estimating the security of existing networks and developing the recommendations for construction of perspective defense systems.
  • The further enhancement of software realization of research environment for investigation of DDoS attacks and defense mechanisms against them (based on agent-based and network packet-based simulation of network security processes) was fulfilled. For realization of the research environment, the simulation system architecture is used. It includes the Base Simulation System, the Internet Simulation Framework, the Multi-agent Simulation Framework and the Module (Library) for DDoS attacks and defense mechanisms against them. The designed simulation environment allows carrying out various experiments to investigate DDoS attack strategies and prospective defense mechanisms. Experiments on research of cooperative defense mechanisms have been carried out. These experiments have included the simulation of such distributed defense mechanisms as DefCOM, COSSACK, without cooperation, cooperation at a level of filters, cooperation at a level of samplers, full cooperation. Various adaptive methods of agent teams interaction have been also investigated.
  • The proactive approach to protection against network worms was developed. It is based on the combination of various mechanisms of detection and containment of network worms and automatic adjustment of key parameters of defense mechanisms according to the current network configuration and the network traffic. For development of the proactive approach it is offered to use a combination of the following features: the multi-resolution approach which combines the use of several time intervals (windows) of network traffic supervision and the application of various thresholds for traced parameters; the hybrid approach consisting in the use of various algorithms and mathematical methods; the multilevel combination of algorithms as a system of base qualifiers processing the traffic data, and the meta-qualifier which chooses the decision; the adaptive mechanisms of detection and containment of network worms capable to change the criterion of detection on the basis of network traffic parameters. The software of simulation and evaluation of detection and containment of network worms was developed. It includes the following components: the traffic sources or the traffic generator (which forms the normal traffic and the network worm traffic); the traffic analyzer; the libraries of defense mechanisms against network worms; testing scenarios and the base test complex or estimation component. A series of experiments for the choice of optimum parameters of defense mechanisms was fulfilled.
  • The models of software protection based on the mechanism of remote trust were investigated. This mechanism is intended for detection of non-authorized changes of a client program functioning in potentially hostile environment, and also the possible classes of attacks to the specified defense mechanisms. The mechanism of the mobile module replacement in the client program is offered. It is based of the concept of aspect-oriented programming according to which various functionalities of the client program are programmed separately, and then are built in the target code.
  • The theoretical basis and operation algorithms of deception systems (DS) were developed. These systems represent hardware-software tools for information protection that are based on the technology of traps and false targets. In particular, we developed the requirements to DS, the generalized architecture of multi-agent DS, the generalized models and algorithms of disguised counteraction to remote non-authorized access to information resources, including the models of malefactor detection and readdressing of non-authorized request to false components, determining the malefactor plan (strategy), generating a plan of false components operation, etc. The offered approach is based on simulation of information systems components and on using three levels of malefactor deception: (1) a network segment level the whole network segment is emulated; (2) a host level among working servers the bait-host is used; (3) a services and applications level the programs emulating services and applications are applied on servers. The deception software system was implemented. We fulfilled a set of experiments on investigating basic deception functions at realization of different attacks. These experiments are executed on several different scenarios determined according to various attack types.

Top 

Professional activities

Serving as PC member of International and Russian conferences:

2017

  • The 25th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP 2017). St. Petersburg, Russia. March 6-8, 2017. http://www.pdp2017.org (PC Chair).
  • Special session Security in Parallel, Distributed and Network-Based Computing (SPDNS 2017). PDP 2017. St. Petersburg, Russia. March 6-8, 2017. http://pdp2017.org/spdns.html (PC Chair).
  • The 6-th International Conference on Agents and Artificial Intelligence (ICAART 2016). Porto, Portugal. February 24-26, 2017. http://www.icaart.org (PC Member).
  • The IEEE ICC 2017 Communication and Information Systems Security Symposium (ICC'17 CISS). Paris, France. May 21-25, 2017. http://icc2017.ieee-icc.org/ (PC Member).
  • The 8th International Symposium Information Fusion and Intelligent Geographical Information Systems 2017 (IF&IGIS17). Shanghai, China. May 10-12, 2017. http://if-gis.com/ (PC Member).

2016

  • Special session Security in Parallel, Distributed and Network-Based Computing (SPDNS 2016). PDP 2016. Heraklion, Crete, Greece. February 17-19, 2016. http://pdp2016.org/SS4.html (PC Chair).
  • The 6-th International Conference on Agents and Artificial Intelligence (ICAART 2016). Rome, Italy. February 24-26, 2016. http://www.icaart.org (PC Member).
  • The 18th Conference RusCrypto 2016 on Cryptology, Steganography, Digital Signature and Security Systems. Solnechnegorsk, Russia. March 22-25, 2016. http://www.ruscrypto.ru (Session moderator).
  • The 12th European Dependable Computing Conference (EDCC-2016). Gothenburg, Sweden. September 5-9, 2016. http://edcc.dependability.org/ (PC Member).
  • The 5th International Workshop on Cyber Crime (IWCC 2016). Salzburg, Austria. August 29 - September 2, 2016. http://stegano.net/IWCC2016/ (PC Member).
  • The 30th European Conference on Modelling and Simulation (ECMS 2016). Regensburg, Germany. May 31 - June 3, 2016. http://www.scs-europe.net/conf/ecms2016/ (PC Member).
  • The Eighth International Conference on Evolving Internet (INTERNET 2016). Barcelona, Spain. November 13-17, 2016. http://www.iaria.org/conferences2016/ComINTERNET16.html (PC Member).
  • The 8th International Symposium on Intelligent Distributed Computing (IDC 2016). Paris, France. October 10-12, 2016. http://idc2016.lip6.fr/ (PC Member).
  • The 8th International Workshop on Reliable Networks Design and Modeling (RNDM 2016). Halmstad, Sweden. September 12-14, 2016. http://www.rndm.pl/2016/ (PC Member).
  • The 9th International Symposium on Multimedia Applications and Processing (MMAP 2016). Gdansk, Poland. September 11-14, 2016. https://fedcsis.org/2016/mmap (PC Member).
  • The ACM/IEEE 16th International Conference on Cyberworlds (Cyberworlds 2016). Chongqing, China. September 28-30, 2016. http://www.cyberworlds-conference.org/ (PC Member).
  • The Fifth International Conference on Communications, Computation, Networks and Technologies (INNOV 2016). Brussels, Belgium. August 21-25, 2016. http://www.iaria.org/conferences2016/INNOV16.html (PC Member).
  • The 11th International Symposium on INnovations in Intelligent SysTems and Applications (INISTA 2016). Sinaia, Romania. August 2-5, 2016. http://www.inista.org/ (PC Member).
  • Decision Making in Dynamic Information Environments workshop (DeMaDIE 2016). Sevilla, Spain. June 1-3, 2016. http://www.paams.net/workshops/demadie (PC Member).
  • The 7th EAI International Conference on Big Data Technologies and Applications (BDTA 2016). Seoul, South Korea. November 17-18, 2016. http://www.infoscale.org/2016/ (PC Member).
  • The 29th International Conference on Industrial, Engineering & Other Applications of Applied Intelligent Systems (IEA-AIE 2016). Iwate, Japan. August 2-4, 2016. http://ieaaie2016.iwate-pu.net (PC Member).
  • The 15th International Conference on Intelligent Software Methodologies, Tools and Techniques (SOMET 2016). Larnaca, Cyprus. September 12-14, 2016. http://www.cyprusconferences.org/somet2016/ (PC Member).
  • The 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS-2016). Track "Autonomic Computing and Communication". Fukuoka, Japan. July 6-8, 2016. http://voyager.ce.fit.ac.jp/conf/cisis/2016/ (PC Member).
  • The 22nd Asia-Pacific Conference on Communications (APCC 2016). Yogyakarta, Indonesia. August 25-27, 2016. http://apcc2016.org/ (PC Member).
  • The 8th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT 2016). Lisbon, Portugal. October 18-20, 2016. http://www.icumt.info (PC Member).
  • International Workshop on Big Data Analytics for Cyber Security (BDA4CS 2016). December 6-9, 2016 Tongji University Shanghai, China. http://siwn.org.uk/events/bda4cs16/ (PC Member).
  • The International Workshop on Bio-inspired Security, Trust, Assurance and Resilience (BioSTAR 2016). Fairmont, San Jose, CA, USA. May 26, 2016. http://biostar.cybersecurity.bio/ (PC Member).
  • The 11th International Conference on Risks and Security of Internet and Systems (CRiSIS 2016). Roscoff, France. September 5-7, 2016. http://conferences.telecom-bretagne.eu/crisis/2016/ (PC Member).
  • International Symposium of Mobile Internet Security (MobiSec 2016). Taichung, Taiwan. July 14-15, 2016. http://isyou.info/conf/mobisec16/ (Publication Chair).
  • The International Workshop on AI for Privacy and Security (PrAISe 2016). The Hague, Holland. August 29-30, 2016. http://mas.cmpe.boun.edu.tr/praise2016/ (PC Member).
  • The Tenth International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2016). Nice, France. July 24-28, 2016. http://iaria.org/conferences2016/SECURWARE16.html (PC Member).
  • The International Workshop on Traffic Measurements for Cybersecurity (WTMC 2016). Xi'an, China. May 30, 2016. http://wtmc.info (PC Member).

2015

  • Special session Security in Parallel, Distributed and Network-Based Computing (SPDNS 2015). PDP 2015. Turku, Finland, March 4-6, 2015. http://pdp2015.org/specialsessions/snds/snds.html (PC Chair).
  • The International Conference on Agents and Artificial Intelligence (ICAART 2015). Lisbon, Portugal. January 10 - 12, 2015. http://www.icaart.org (PC Member).
  • The 17th Conference RusCrypto 2015 on Cryptology, Steganography, Digital Signature and Security Systems. Solnechnegorsk, Russia. March 17-20, 2015. http://www.ruscrypto.ru (Session moderator).
  • Seventh International Workshop Information Fusion and Geographic Information Systems (IF&GIS' 2015). Grenoble, France. May 18-20. http://if-gis.com/ (PC Member).
  • The 2015 Asian Conference on Availability, Reliability and Security (AsiaARES 2015), Daejeon, Korea, October 4-7. http://www.asiaares.org/ (PC Member).
  • The Second International Workshop on Agents and CyberSecurity (ACySe 2015). Istanbul, Turkey. May 4-8, 2015. https://sites.google.com/site/acyse2015/ (PC Member).
  • The 11th European Dependable Computing Conference (EDCC-2015). Paris, France. September 9-11, 2015. http://edcc.dependability.org/ (PC Member).
  • The International Workshop on Cyber Crime (IWCC 2015). Toulouse, France. August 24-28, 2015. http://stegano.net/IWCC2015 (PC Member).
  • The 29th European Conference on Modelling and Simulation (ECMS 2015). Albena (Varna), Bulgaria. May 26-29, 2015. http://www.scs-europe.net/conf/ecms2015/ (PC Member).
  • The 10th International Workshop on Digital Forensics and Incident Analysis (WDFIA 2015). Lesvos, Greece. July 1-3, 2015. http://www.wdfia.org/ (PC Member).
  • The 10th International Conference on Risks and Security of Internet and Systems (CRiSIS 2015), Lesbos, Greece, July 20-22, 2015. http://www.ds.unipi.gr/crisis2015/home.html (PC Member).
  • The 7th International Conference on Evolving Internet (INTERNET 2015). St. Julians, Malta. October 11 - 16, 2015. http://www.iaria.org/conferences2015/INTERNET15.html (PC Member).
  • The IADIS Intelligent Systems and Agents 2015 (ISA 2015). Las Palmas de Gran Canaria, Spain. July 22-24, 2015. http://www.isa-conf.org/ (PC Member).
  • The 9th International Symposium on Intelligent Distributed Computing (IDC 2015). Guimaraes, Portugal, Oct. 7-9, 2015. http://aida.ii.uam.es/IDC2015 (PC Member).
  • The Workshop on "Cyber Security and Resilience of Large-Scale Systems (WSRL 2015)". Guimaraes, Portugal, Oct. 7-9, 2015. http://aida.ii.uam.es/IDC2015 (PC Member).
  • The 7th International Workshop on Reliable Networks Design and Modeling (RNDM 2015). Munich, Germany. October 5-7, 2015. http://www.rndm.pl/2015/ (PC Member).
  • The Ninth International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2015). Venice, Italy. August 23-28, 2015. http://www.iaria.org/conferences2015/SECURWARE15.html (PC Member).
  • International Symposium on Multimedia Applications and Processing (MMAP 2015). Lodz, Poland. September 13-16, 2015. http://www.fedcsis.org/ (PC Member).
  • The 14th International Conference on Intelligent Software Methodologies Tools and Techniques (SOMET 2015). Naples, Italy. September 15-17, 2015. http://www.impianti.unina.it/somet2015/ (PC Member).
  • The 14th International Conference on Cyberworlds (Cyberworlds 2015). Gotland, Sweden. October 7-9, 2015. http://www.cyberworlds-conference.org/ (PC Member).
  • The Fourth International Conference on Communications, Computation, Networks and Technologies (INNOV 2015). Barcelona, Spain. November 15-20, 2015. http://www.iaria.org/conferences2015/INNOV15.html (PC Member).
  • The 14th International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15). Helsinki, Finland, Aug. 20-22, 2015 http://comnet.aalto.fi/Trustcom2015/ (Workshop Chair).
  • The First International Workshop on Agile Secure Software Development (ASSD 2015). Toulouse, France. August 26, 2015. http://www.ares-conference.eu/conference/ (PC Member).
  • The Workshop on Bio-inspired Cyber Security & Networking (BCSN 2015). Ghent, Belgium. September 11, 2015. http://stegano.net/BCSN2015. (PC Member).
  • The 8th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS2015), Warsaw, Poland, Sept. 24-26, 2015. http://idaacs.net/2015/ (PC Member, Coordinator of the Special Stream).
  • The 7th International Congress on Ultra Modern Telecommunications and Control Systems (ICUMT 2015). Brno, Czech Republic. October 6-8, 2015. http://www.icumt.info/2015/ (PC Member).
  • The 18th IEEE International Conference on Computational Science and Engineering (CSE 2015), Porto, Portugal, October 21-23, 2015. http://paginas.fe.up.pt/~specs/events/cse2015/index.php?page=home (Program Vice-Chair).
  • The 4th IEEE International Conference on Connected Vehicles & Expo (ICCVE 2015). Shenzhen, China. October 19-23, 2015. http://www.iccve.org (PC Member).
  • The IX St.-Petersburg Interregional Conference Information Security of Russian Regions (ISRR-2015), Oct. 28-30, 2015. http://spoisu.ru/conf/ibrr2015 (Section Chair, PC Member).
  • The International Scientific School "Incident management and countering targeted cyber-physical attacks in distributed large-scale critical systems (IM&CTCPA 2015)", Saint-Petersburg, November 26-28, 2015. http://www.comsec.spb.ru/imctcpa15/ (PC Member).
  • The 2nd International Conference on Information Science and Security. Seoul, Korea. December 14-16, 2015. http://icatse.org/iciss/ (PC Member).
  • The 7th ACM CCS International Workshop on Managing Insider Security Threats (ACM MIST 2015). Denver, Colorado, USA. October 12-16, 2015. http://isyou.info/conf/mist15 (PC Member).
  • IEEE Globecom'15 - Communication & Information System Security Symposium. San Diego, California, USA. December 6-10, 2015. http://globecom2015.ieee-globecom.org (PC Member).

2014

  • The 22th International Euromicro Conference on Parallel, Distributed and Network-based Processing (PDP 2014). Turin, Italy. February 12-14, 2014. http://www.pdp2014.org (PC Member).
  • Special session Security in Networked and Distributed Systems (SNDS 2014). PDP 2014. Turin, Italy. February 12-14, 2014. http://www.comsec.spb.ru/SNDS14/ (PC Chair).
  • The 6-th International Conference on Agents and Artificial Intelligence (ICAART 2014). Angers, Loire Valley, France. March 6 - 8, 2014. http://www.icaart.org (PC Member).
  • The 16th Conference RusCrypto 2014 on Cryptology, Steganography, Digital Signature and Security Systems. Solnechnegorsk, Russia. March 25-28, 2014. http://www.ruscrypto.ru (Session moderator).
  • The 2014 Asian Conference on Availability, Reliability and Security (AsiaARES 2014). Bali, Indonesia. April 14-17, 2014. http://www.asiaares.org/ (PC Member).
  • The First International Workshop on Agents and CyberSecurity (ACySe 2014). To be held with thr Autonomous Agents and Multi-Agent Systems Conference (AAMAS 2014). Paris, France. May 5-9, 2014. http://sites.google.com/site/acyseaamas2014/ (PC Member).
  • The Tenth European Dependable Computing Conference (EDCC-2014). Newcastle, UK. May 13-16, 2014. http://edcc.dependability.org/ (PC Member).
  • The First International Workshop on Real-time Big Data Analytics for Critical Infrastructure Protection (BIG4CIP 2014). Newcastle upon Tyne, UK. May 13-16, 2014. http://www.big4cip.org/ (PC Member).
  • The International Workshop on Cyber Crime (IWCC 2013). Co-located with The 34th IEEE Symposium on Security and Privacy (IEEE S&P 2013). San Jose, CA, USA. May 17-18, 2014. http://stegano.net/IWCC2014 (PC Member).
  • The 28th European Conference on Modelling and Simulation (ECMS 2014). Brescia, Italy. May 27 30, 2014. http://www.scs-europe.net/conf/ecms2014/ (PC Member).
  • The 6th International Conference on Cyber Conflict 2014 (CyCon 2014). Tallinn, Estonia. June 3-6, 2014. http://ccdcoe.org/cycon/ (PC Member).
  • The 9th International Workshop on Digital Forensics and Incident Analysis (WDFIA 2014). Plymouth, UK. July 8-10, 2014. http://www.wdfia.org/ (PC Member).
  • IEEE International Conference on Communications (IEEE ICC 2014). Communications and Information Systems Security Symposium (CISS 2014). Sydney, Australia. June 16-20, 2014. http://www.ieee-icc.org/2014 (PC Member).
  • The Sixth International Conference on Evolving Internet (INTERNET 2014). Seville, Spain. June 22-26, 2014. http://www.iaria.org/conferences2014/INTERNET14.html (PC Member).
  • The IADIS Intelligent Systems and Agents 2014 (ISA 2014). Lisbon, Portugal. July 15-17, 2014. http://www.isa-conf.org/ (PC Member).
  • The 8th International Symposium on Intelligent Distributed Computing (IDC 2014). Madrid, Spain. September 3-5, 2014. http://aida.ii.uam.es/IDC2014 (PC Member).
  • The 6th International Workshop on Reliable Networks Design and Modeling (RNDM 2014). St. Petersburg, Russia. September 3-5, 2014. http://www.rndm.pl/2014/ (PC Member).
  • International Symposium on Multimedia Applications and Processing (MMAP 2014). Warsaw, Poland. September 7-10, 2014. http://www.fedcsis.org/ (PC Member).
  • The International Conference on Emerging Intelligent Data and Web Technologies (EIDWT 2014). Salerno, Italy. September 10-12, 2014. http://voyager.ce.fit.ac.jp/conf/eidwt/2014/ (Track Co-chair).
  • The 14th International Conference on Cyberworlds (Cyberworlds 2014). Santander, Spain. October 6-8, 2014. http://www.cw2014.unican.es (PC Member).
  • The Third International Conference on Communications, Computation, Networks and Technologies (INNOV 2014). Nice, France. October 12-16, 2014. http://www.iaria.org/conferences2014/INNOV14.html (PC Member).

2013

  • International Conference on Computing, Networking and Communications. Communications and Information Security Symposium (ICNC'13 - CIS). San Diego, USA. January 28-31, 2013. http://www.conf-icnc.org/ (PC Member).
  • 5th International Conference on Agents and Artificial Intelligence (ICAART 2013). Barcelona, Spain. February 15-18, 2013. http://www.icaart.org (PC Member).
  • The 21th International Euromicro Conference on Parallel, Distributed and Network-based Processing (PDP 2013). Belfast, Northern Ireland, UK. 27th February 1st March 2013. http://www.pdp2013.org (PC Member).
  • Special session Security in Networked and Distributed Systems (SNDS 2013). PDP 2013. Belfast, Northern Ireland, UK. 27th February 1st March 2013. http://www.comsec.spb.ru/SNDS13/ (PC Chair).
  • Ninth International Conference on Networking and Services (ICNC'13). Lisbon, Portugal. March 24 - 29, 2013. http://www.iaria.org/conferences2013/ICNS13.html (PC Member).
  • The Ninth International Conference on Autonomic and Autonomous Systems (ICAS 2013). Lisbon, Portugal. March 24-29, 2013. http://www.iaria.org/conferences2013/ICAS13.html (PC Member).
  • The 15th Conference RusCrypto 2013 on Cryptology, Steganography, Digital Signature and Security Systems. Solnechnegorsk, Russia. March 28-30, 2013. http://www.ruscrypto.ru (Session moderator).
  • The 8th International Annual Workshop on Digital Forensics & Incident Analysis (WDFIA 2013). Lisbon, Portugal. May 8-10, 2013. http://www.wdfia.org/ (PC Member).
  • The 6th International Workshop on Information Fusion and Geographical Information Systems: Environmental and Urban Challenges (IF&GIS 2013). St.Petersburg, Russia, May 12-15, 2013. http://if-gis.com/ (PC Member).
  • The 7th International Conference "Integrated models and soft computing in Artificial Intelligence". Kolomna, Russia. May 20-22, 2013. http://imscai.rk9.bmstu.ru/ (PC Member).
  • International forum on practical information security Positive Hack Days. PHD Young School 2013. Moscow. May 23-24, 2013. http://phdays.com/ (PC Member).
  • The International Workshop on Cyber Crime (IWCC 2013). Co-located with The 34th IEEE Symposium on Security and Privacy (IEEE S&P 2013). San Francisco, May 25, 2013. http://stegano.net/IWCC2013/ (PC Member).
  • The 27th European Conference on Modelling and Simulation (ECMS 2013). Aalesund University College, Norway. May 27 - May 30st, 2013. http://www.scs-europe.net/conf/ecms2013/ (PC Member).
  • The Arab International Conference on Computer Systems and Applications (AICSSA'2013). The track "Security and privacy". Ifrane, Morocco. May 27-30, 2013. http://aiccsa.uic.edu/ (PC Member).
  • The 5th International Conference on Cyber Conflict 2013 (CyCon 2013). Tallinn, Estonia. June 4-7, 2013. http://ccdcoe.org/cycon/ (PC Member).
  • The 1st IEEE Workshop on Intelligent Data Analysis with Applications in Information Retrieval and Machine Learning (IDAIR). Sesimbra, Portugal. June 26-28, 2013. http://iimss-13.kesinternational.org/cms/user/ISdisplay.php (PC Member).
  • 5th International Conference on Personal Satellite Services (PSATS 2013). Toulouse, France. June 2728, 2013. http://www.psats.eu/ (PC Member).
  • The Fifth International Conference on Evolving Internet (INTERNET 2013). Nice, France. July 21 - 26, 2013. ttp://www.iaria.org/conferences2013/INTERNET13.html (PC Member).
  • The IADIS Intelligent Systems and Agents 2013 (ISA 2013). Prague, Czech Republic, July 22-24, 2013. http://www.isa-conf.org/ (PC Member).
  • The 7th International Symposium on Intelligent Distributed Computing (IDC 2013). Prague, Czech Republic. September 4-6, 2013. http://www.ksi.mff.cuni.cz/IDC2013/ (PC Member).
  • International Symposium on Multimedia Applications and Processing (MMAP 2013). Krakow, Poland, September 8-11, 2013. http://www.fedcsis.org/ (PC Member).
  • 5th International Workshop on Reliable Networks Design and Modeling (RNDM 2013). Almaty, Kazakhstan. September 24-27, 2013. http://www.rndm.pl (PC Member).
  • The 5th International Congress on Ultra Modern Telecommunications and Control Systems (ICUMT 2013). Almaty, Kazakhstan. September 10-13, 2013. http://www.icumt.org (PC Member).
  • The IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS'2013). Berlin, Germany, September 12-14, 2013. http://idaacs.net/ (PC Member, Stream co-chair).
  • 12th International Conference on Intelligent Software Methodologies, Tools and Techniques. Budapest, Hungary. September 22-24, 2013. http://conf.uni-obuda.hu/somet2013/ (PC Member).
  • The 13th International Conference on Cyberworlds (Cyberworlds 2013). Yokohama, Japan. October 21-23, 2013. http://www.vc.media.yamanashi.ac.jp/cw2013/ (PC Member).
  • VIII St.Petersburg Interregional Conference Information Security of Russian Regions (ISRR-2013). St.Petersburg, Russia. October 23-25, 2013. http://spoisu.ru/conf/ibrr2013 (PC Member).
  • 13th International Conference on Telecommunications for Intelligent Transport Systems (ITST 2013). Tampere, Finland. October 16-18, 2013. http://www.itst2013.org (PC Member).
  • The 8th International Conference on Risks and Security of Internet and Systems (CRiSIS 2013). La Rochelle, France. October 23-25, 2013. http://secinfo.msi.unilim.fr/crisis2013/ (PC Member).
  • The 11th IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC 2013) - Security and Fault Tolerance Applications Track. Zhangjiajie, China. November 13-15, 2013. http://trust.csu.edu.cn/conference/euc2013/ (PC Member).
  • The Second International Conference on Communications, Computation, Networks and Technologies (INNOV 2013). Lisbon, Portugal. November 17-22, 2013. http://www.iaria.org/conferences2013/INNOV13.html (PC Member).
  • The 2nd International Conference on Connected Vehicles & Expo (ICCVE 2013). Las Vegas, Nevada, USA. December 2-6, 2013. http://www.ICCVE.org (PC Member).
  • The 13th IEEE International Conference on Computer and Information Technology, Sydney, Australia. December 3-5, 2013. http://www.swinflow.org/confs/cit2013 (PC Member).
  • International Conference on Mathematics and Computing (ICMC 2013). Haldia, India. December 26-29, 2013. http://hithaldia.in/icmc2013 (PC Member).

2012

  • International Conference on Computing, Networking and Communications. Communications and Information Security Symposium (ICNC'12 - CIS). Maui, Hawaii. January 30 February 2, 2012. http://www.conf-icnc.org/ (PC Member).
  • 4th International Conference on Agents and Artificial Intelligence (ICAART 2012). Vilamoura, Algarve, Portugal. February 6-8, 2012. http://www.icaart.org (PC Member).
  • 20th Euromicro International Conference on Parallel, Distributed and network-based Processing (PDP 2012). Garching near Munich, Germany. February 15-17, 2012. http://www.pdp2012.org (PC Member).
  • Special session Security in Networked and Distributed Systems (SNDS 2012). PDP 2011. Garching near Munich, Germany. February 15-17, 2012. http://www.comsec.spb.ru/SNDS12/ (PC Chairman).
  • The 4th International ICST Conference on Personal Satellite Services (PSATS 2012). Bradford, United Kingdom. March 22-23, 2012. http://www.psats.eu/ (PC Member).
  • The Eighth International Conference on Networking and Services (ICNS 2012). St. Maarten, Netherlands Antilles. March 25-29, 2012. http://www.iaria.org/conferences2012/ICNS12.html (PC Member).
  • 9th European Dependable Computing Conference (EDCC-2012). Sibiu, Romania. May 8-11, 2012. http://edcc.dependability.org/ (PC Member).
  • 26th European Conference on Modelling and Simulation (ECMS 2012). Koblenz, Germany. May 29 - June 1st, 2012. http://www.scs-europe.net/conf/ecms2012/index.html (PC Member).
  • 7th International Annual Workshop on Digital Forensics & Incident Analysis (WDFIA 2012). Crete, Greece. June 6-8, 2012. http://www.wdfia.org/ (PC Member).
  • The 2012 IEEE World Congress on Computational Intelligence (IEEE WCCI 2012). Special Session on Computational Intelligence for Measurement Systems. Brisbane, Australia. June 10-15, 2012. http://www.ieee-wcci2012.org/ (PC Member).
  • International conference "Mathematical Methods, Models and Architectures for Computer Network Security 2012" (MMM-ACNS-2012). St. Petersburg, Russia. September 11-13, 2012. http://comsec.spb.ru/mmm-acns12/ (PC Co-Chair).
  • Second International Workshop "Scientific Analysis and Policy Support for Cyber Security" (SA&PS4CS 2012). St. Petersburg, Russia. September 14, 2012. http://www.comsec.spb.ru/saps4cs12 (PC Co-Chair).
  • The 2012 IEEE International Conference on Internet of Things (iThings 2012). Besancon, France. September 12-14, 2012. http://ieee-iot.org (PC Co-chair).
  • 6th International Symposium on Intelligent Distributed Computing (IDC 2012). Calabria, Italy. September 24-26, 2012. http://idc2012.deis.unical.it (PC Member).
  • The 12th International Conference on Cyberworlds (Cyberworlds 2012). Darmstadt, Germany. September 25-27, 2012. http://www.gris.tu-darmstadt.de/cw2012/ (PC Co-Chair).
  • 4th International Workshop on Reliable Networks Design and Modeling (RNDM 2012). St. Petersburg, Russia. October 3-5, 2012. http://www.rndm.pl (PC Member).
  • The 14th Conference RusCrypto 2012 on Cryptology, Steganography, Digital Signature and Security Systems. Solnechnegorsk, Russia. March 28-30, 2012. http://www.ruscrypto.ru (Session moderator).
  • International forum on practical information security Positive Hack Days. PHD Young School 2012. Moscow. May 30-31, 2012. http://phdays.com/ (PC Member).
  • The IADIS Intelligent Systems and Agents 2012 (ISA 2012). Lisbon, Portugal, July 21-23, 2012. http://www.isa-conf.org/ (PC Member).
  • The 9th International Conference on Mobile Web Information Systems (MobiWIS 2012). Niagara Falls, Ontario, Canada, August 27-29, 2012. http://www.mobiwis.org/2012/ (PC Member).
  • The International Conference on Computer Convergence Technology (ICCCT 2012). Jeju Island, Korea. August 30 - September 1, 2012. http://www.kkits.or.kr/ICCCT2012/index.htm (PC Member).
  • International Symposium on Multimedia Applications and Processing (MMAP'2012). Wroclaw, Poland, September 9-12, 2012. http://www.fedcsis.org/mmap (PC Member).
  • The 15th Information Security Conference (ISC 2012). Passau, Germany, September 19-21, 2012. http://web.sec.uni-passau.de/isc2012/ (PC Member).
  • The 10 International Conference on Intelligent Software Methodologies, Tools, and Techniques (SOMET_12). Genoa (Italy), September 26-28, 2012. https://cmt.research.microsoft.com/SOMET2012/ (PC Member).
  • The International Conference on Ultra Modern Telecommunications (ICUMT 2012). St. Petersburg, Russia. October 3 - 5, 2012. http://www.icumt.org/ (PC Member).
  • The 5th Russian Multiconference on Problems of Control (MCPC-2012). The Conference "Information technology in Control" (ITC-2012). St.Petersburg. October 911, 2012. http://www.spiiras.nw.ru/conf/itu-2012/index.par (PC Member).
  • 12th International Conference on Telecommunications for Intelligent Transport Systems (ITST 2012). Taipei, Taiwan. November 5-8, 2012. http://www.itst2012.org/welcome.html (PC Member).
  • The 7th International Conference on Frontier of Computer Science and Technology - Trust, Security and Privacy Track. Suzhou, China, November 21-23, 2012. http://trust.csu.edu.cn/conference/FCST2012/ (PC Member).
  • The 2012 International workshop on Secure and Trust Computing (ST-COM 2012). Jeju, Korea. November 22 - 25, 2012. http://www.ftrai.org/csa2012 (PC Member).
  • Globecom 2012 - Communication and Information System Security Symposium. Anahem, California, USA, December 2012. http://www.ieee-globecom.org/ (PC Member).

2011

  • International Conference on Agents and Artificial Intelligence (ICAART 2011). Rome, Italy. January 28-30, 2011. http://www.icaart.org (PC Member).
  • Special session Security in Networked and Distributed Systems (SNDS 2011). PDP 2011. Ayia Napa, Cyprus. February 9-11, 2011. http://www.comsec.spb.ru/SNDS11/ (PC Chairman).
  • 19th Euromicro International Conference on Parallel, Distributed and network-based Processing (PDP 2011). Ayia Napa, Cyprus. February 9-11, 2011. http://www.pdp2011.org (PC Member).
  • 13th Conference RusCrypto 2011 on Cryptology, Steganography, Digital Signature and Security Systems. Zvenigorod, Russia. March 30 April 2, 2011. http://www.ruscrypto.ru (Session moderator).
  • The 2nd International Conference Ubiquitous Computing and Multimedia Applications (UCMA 2011). Daejeon, Korea. April 13-15, 2011. http://sersc.org/UCMA2011/index.php (PC Member).
  • The Fifth International Workshop Information Fusion and Geographical Information: Towards the Digital Ocean (IF&GIS-2011). Brest, France. May 10-11, 2011. http://if-gis.com/ (PC Member).
  • VI International Conference "Integrated Models and Soft Computing in Artificial Intelligence ". May 16-19, 2011. http://imscai.rk9.bmstu.ru/ (PC Member).
  • Third International Workshop on Network Steganography (IWNS 2011). Prague, Czech Republic. May 26-28, 2011. http://stegano.net/workshop (PC Member).
  • 25th European Conference on Modelling and Simulation (ECMS 2011). Krakow, Poland. June 7-10, 2011. http://www.scs-europe.net/conf/ecms2011/index.html (PC Member).
  • Communications and Information System Security Symposium (CISS 2011). Kyoto, Japan. 5-9 June, 2011. http://www.ieee-icc.org/2011/ (PC Member).
  • 6th International Annual Workshop on Digital Forensics & Incident Analysis (WDFIA 2011). London, UK. July 7-8, 2011. http://www.wdfia.org/ (PC Member).
  • IADIS Multi Conference on Computer Science and Information Systems (MCCIS 2011). Conference INTELLIGENT SYSTEMS AND AGENTS (ISA2011). Rome, Italy. July 24 26, 2011. http://www.isa-conf.org/ (PC Member).
  • The 11th IEEE International Conference on Computer and Information Technology (CIT-11). Cyprus, August 31 - September 2, 2011. http://www.cs.ucy.ac.cy/CIT2011/ (PC Member).
  • International Conference on Mobile Learning, E-society & E-Management (ICMLEM 2011). Prague, Czech Republic. September 6-7, 2011. http://www.icedmat.com/ (PC Member).
  • IEEE Sixth International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS'2011). Prague, Czech Republic. September 15-17, 2011. http://idaacs.net/ (PC Member).
  • International Workshop on Agent Based Computing: from Model to Implementation VIII (ABC:MI'11). Szczecin, Poland, September 19-21, 2011. http://fedcsis.org/?q=node/18 (PC Member).
  • International Conference on Convergence and Hybrid Information Technology (ICHIT 2011). Daejeon, Korea. September 22-24, 2011. http://www.ichit2011.org (PC Member).
  • International Symposium on Multimedia Applications and Processing (MMAP 2011). Szczecin, Poland, September 19-21, 2011. http://mmap.fedcsis.org (PC Member).
  • The 10 International Conference on Intelligent Software Methodologies, Tools, and Techniques (SOMET_11). Saint Petersburg, Russia. September 28-30, 2011. http://www.somet.soft.iwate-pu.ac.jp/somet_11/ (PC Member).
  • The CYBERWORLDS International Conference (Cyberworlds 2011). Banff, Alberta, Canada. October 4-6, 2011 (Topic: Security). http://cw2011.cpsc.ucalgary.ca/ (PC Member).
  • 5rd International Symposium on Intelligent Distributed Computing (IDC 2011). Delft, The Netherlands. October 5-7, 2011. http://idc-2011.d-cis.nl/ (PC Member).
  • International Congress on Ultra Modern Telecommunications (ICUMT 2011). Budapest, Hungary. October 5-7, 2011. http://www.icumt.org/ (PC Member).
  • 3d International Workshop on Reliable Networks Design and Modeling (RNDM 2011). Budapest, Hungary. October 5-7, 2011. http://www.rndm.pl (PC Member).
  • The 16th Nordic Conference in Secure IT Systems (NordSec 2011). Tallinn, Estonia. October 26-28, 2011. http://nordsec2011.cyber.ee/index.html (PC Member).
  • VII St.Petersburg Interregional Conference Information Security of Russian Regions (ISRR-2011). St.Petersburg, Russia. October 26-28, 2011. http://spoisu.ru/conf/ibrr2011 (PC Member).
  • The 6th International Conference on Frontier of Computer Science and Technology, Wireless Sensor Networks and Mobile Computing Track (FCST 2011). Changsha, China. November 16-18, 2011. http://trust.csu.edu.cn/conference/fcst2011/ (PC Member).
  • First International Workshop on Digital Forensics (IWDF 2011). Shanghai, China. November 4-6, 2011. http://iwdf.org (PC Member).
  • The 2011 International Workshop on Secure and Trust Computing (ST Com-11). Jeju, Korea. December 12-15, 2011. http://web.ftrai.org/st-com2011 (PC Member).
  • The 2011 FTRA International Symposium on Advances in Cryptography, Security and Applications for Future Computing (ACSA-11). Jeju, Korea. December 12-15, 2011. http://www.ftrai.org/wcc2011/acsa (PC Member).
  • Conference "Information security: Nevsky dialogue - 2011". St.Petersburg, Russia. November 16, 2011. http://iscs-expo.primexpo.ru/22/40107 (PC Member).
  • The 5th Indian International Conference on Artificial Intelligence (IICAI-11). Tumkur, India. December 14-16, 2011. http://www.iiconference.org (PC Member).

2010

  • International Conference on Agents and Artificial Intelligence (ICAART 2010). Valencia, Spain. January 22-24, 2010. http://www.icaart.org (PC Member).
  • Special session Security in Networked and Distributed Systems (SNDS 2010). PDP 2010. Pisa, Italy. February 17-19, 2010. http://www.comsec.spb.ru/snds10/ (PC Chairman).
  • 18th Euromicro International Conference on Parallel, Distributed and network-based Processing (PDP 2010). Pisa, Italy. February 17-19, 2010. http://www.pdp2010.org (PC Member).
  • 12th Conference RusCrypto 2010 on Cryptology, Steganography, Digital Signature and Security Systems. Zvenigorod, Russia. April 1-4, 2010. http://www.ruscrypto.ru (Session moderator).
  • The Fifth Annual Workshop on Digital Forensics and Incident Analysis (WDFIA 2010). Port Elizabeth, South Africa, May 17-18, 2010. http://www.wdfia.org/ (PC Member).
  • The First International Symposium on Ubiquitous & Trusted Computing (UTC 2010). Busan, Korea, May 21-23, 2010. http://grid.hust.edu.cn/utc2010/ (PC Member).
  • 24th European Conference on Modelling and Simulation (ECMS 2010). Kuala Lumpur, Malaysia. June 1st - 4th, 2010. http://www.scs-europe.net/conf/ecms2010/index.html (PC Member).
  • The First International Conference on Ubiquitous Computing and Multimedia Applications (UCMA 2010). Kolkata, India, June 3-5, 2010. http://www.sersc.org/UCMA2010/ (PC Member).
  • The 4th International Conference on Multimedia and Ubiquitous Engineering (MUE 2010). Cebu, Philippines, August 11 - 13, 2010. http://www.ftrg.org/mue2010 (PC Member).
  • The Fifth International Conference Mathematical Methods, Models and Architectures for Computer Networks Security (MMM-ACNS-2010). St.Petersburg, Russia. September 6-8, 2010. http://comsec.spb.ru/mmm-acns10/ (PC Co-Chairman).
  • International Workshop Scientific Analysis and Policy Support for Cyber Security (SAPSCS 2010). St.Petersburg, Russia. September 9, 2010. http://www.comsec.spb.ru/saps4cs10/ (PC Co-Chairman)
  • 4rd International Symposium on Intelligent Distributed Computing (IDC 2010). Tangier, Morocco. September 16-18, 2010. http://www.ieee.ma/~idc2010/index.html(PC Member).
  • The Third International Symposium on Multimedia Applications and Processing (MMAP 2010). Wisla, Poland, October 18-20, 2010. (PC Member).
  • The 4rd International Workshop on Secure Information Systems (SIS'10). Wisla, Poland. October 18-20, 2010. http://2010.imcsit.org/pg/309/251 (PC Member).
  • International Congress on Ultra Modern Telecommunications (ICUMT 2010). Moscow, Russia, 18-20 October, 2010. http://www.icumt.org/ (PC Member).
  • 2nd International Workshop on Reliable Networks Design and Modeling (RNDM 2010). Moscow, Russia, 18-20 October, 2010. http://www.rndm.pl (PC Member).
  • The XII International Conference Regional informatics-2010 (RI-2010), St. Petersburg, October 20-22, 2010. http://www.spiiras.nw.ru (PC Member).
  • The CYBERWORLDS International Conference (Cyberworlds 2010). Singapore. October 20-22, 2010 (Topic: Security). http://www3.ntu.edu.sg/SCE/cw2010/cw2010.htm (PC Member).
  • The International Conference on Multimedia Information NEtworking and Security (MINES 2010). Nanjing, China, November 4-6, 2010. http://www.ieee-mines.org/ (PC Member).
  • Second International Workshop on Network Steganography (IWNS 2010). Nanjing, China. November 46, 2010. http://stegano.net/workshop (PC Member).
  • The FTRA 2010 International Symposium on Advances in Cryptography, Security and Applications for Future Computing (ACSA-10). Gwangju, Korea, December 9-11, 2010. http://www.ftrg.org/acsa2010/ (PC Member).
  • The 2010 International Conference on u- and e- Service, Science and Technology (UNESST2010). Jeju Island, Korea. December 13-15, 2010. http://www.sersc.org/UNESST2010/ (PC Member).

2009

  • International Conference on Bio-inspired Systems and Signal Processing (BIOSIGNALS 2009). Porto, Portugal. January 14-17, 2009. http://www.biosignals.org/ (PC Member).
  • 17th Euromicro International Conference on Parallel, Distributed and network-based Processing (PDP 2009). Weimar, Germany. February 18-20, 2009. http://www.pdp2009.org (PC Member).
  • Special session Security in Networked and Distributed Systems (SNDS 2009). PDP 2009. Weimar, Germany. February 18-20, 2009. http://www.comsec.spb.ru/SNDS09/ (PC Chairman).
  • IEEE Symposium on Computational Intelligence in Cyber Security (CICS 2009). Nashville, USA. 30 March 2 April, 2009. http://www.ieee-ssci.org/index.php?q=node/21 (PC Member).
  • 11th Conference RusCrypto 2009 on Cryptology, Steganography, Digital Signature and Security Systems. Zvenigorod, Russia. April 3-5, 2009. http://www.ruscrypto.ru (Session moderator).
  • The Fourth International Workshop Information Fusion and Geographical Information Systems (IF&GIS-2009). St.Petersburg, Russia. May 17-20, 2009 (Topic Information Assurance and Protection in GIS). http://www.oogis.ru/ (PC Member).
  • V-th International Conference "Integrated models and soft computing in Artificial Intelligence". Kolomna, Russia. May 28-30, 2009. http://imscai.rk9.bmstu.ru (PC Member).
  • The 3rd International Conference on Multimedia and Ubiquitous Engineering (MUE 2009). Qingdao, China. June 4-6, 2009 (Section Multimedia and Ubiquitous Security) http://grid.hust.edu.cn/mue09/ (PC Member).
  • 23rd European Conference on Modelling and Simulation (ECMS 2009). Madrid, Spain. June 9-12, 2009. http://www.scs-europe.net/conf/ecms2009/ (PC Member).
  • The Fourth Annual Workshop on Digital Forensics and Incident Analysis (WDFIA 2009). Athens, Greece, June 25-26, 2009. http://www.wdfia.org/ (PC Member).
  • 5th International Joint Conference on Networked Computing and Advanced Information Management (NCM 2009). Seoul, Korea. August 25-27, 2009. http://www.aicit.org/ncm (PC Member).
  • International Conference on Convergence and Hybrid Information Technology (ICHIT 2009). Daejeon, Korea. August 2729, 2009. http://www.ichit2009.org (PC Member).
  • The CYBERWORLDS International Conference (Cyberworlds 2009). Bradford, UK. September 7-11, 2009 (Topic: Security). http://www.inf.brad.ac.uk/cw09 (PC Member).
  • 3rd International Symposium on Intelligent Distributed Computing (IDC 2009). Ayia Napa, Cyprus. September 12-14, 2009. http://www.idc2009.cs.ucy.ac.cy (PC Member).
  • The IEEE Fifth International Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS'2009), Rende (Cosenza), Italy. September 21-23, 2009. http://www.idaacs.net/ (PC Member).
  • Second International Workshop on Remote Entrusting (RE-TRUST 2009). Riva del Garda, Italy. September 30 - October 1, 2009. http://www.re-trust.org (PC Member).
  • Second International Workshop on Security and Privacy in Wireless and Mobile Computing, Networking and Communications (SecPri_WiMob 2009). Marrakech, Morocco. October 12, 2009. http://www.icsd.aegean.gr/SecPri_WiMob_2009 (PC Member).
  • Second International Symposium on Multimedia Applications and Processing (MMAP'09). Mragowo, Polland, October 12-14, 2009. http://www.mmap.imcsit.org (PC Member).
  • International Workshop on Reliable Networks Design and Modeling (RNDM 2009). St. Petersburg, Russia. October 12-14 2009. http://www.icumt.org/w-10.html (PC Member).
  • The Second International Conference on u- and e- Service, Science and Technology (UNESST2009). Melbourne, Australia. October 12-14, 2008. http://www.sersc.org/UNESST2009/ (PC Member).
  • VI St.Petersburg Interregional Conference Information Security of Russian Regions (ISRR-2009). St.Petersburg, Russia. October 23-25, 2009. http://www.spiiras.nw.ru (PC Member).
  • The 6th International Workshop on Formal Aspects in Security&Trust (FAST2009). Eindhoven, Netherlands. November 5-6, 2009. http://www.win.tue.nl/fmweek/ (PC Member).
  • The First International Conference on Multimedia Information NEtworking and Security (MINES 2009), Wuhan, China, November 18-20, 2009. http://liss.whu.edu.cn/mines2009 (PC Member).
  • The First International Workshop on Network Steganography (IWNS 2009). Wuhan, Hubei, China, 18-20 November 2009. http://stegano.net/workshop/ , http://liss.whu.edu.cn/mines2009/ (PC Member).
  • International Workshop on Secure Multimedia Communication and Services (SECMCS'09). Wuhan, Hubei, China, 18-20 November 2009. http://liss.whu.edu.cn/mines2009/ (PC Member).
  • Fourth International Conference on Computer Sciences and Convergence Information Technology (ICCIT 2009). Seoul, Korea. November 24-26, 2009. http://www.aicit.org/iccit (PC Member).
  • 2009 FTRG International Workshop on Advances in Cryptography, Security and Applications for Future Computing (ACSA-09). Jeju, Korea, December 11-12, 2009. http://www.ftrg.org/acsa2009/ (PC Member).
  • The 4th Indian International Conference on Artificial Intelligence (IICAI-09). Tumkur, India. December 16-18, 2009. http://www.iiconference.org (PC Member).

2008

  • International Conference on Bio-inspired Systems and Signal Processing (BIOSIGNALS 2008). Funchal, Madeira, Portugal. January 28-31, 2008. http://www.biosignals.org/Biosignals2008/ (PC Member).
  • 16th Euromicro International Conference on Parallel, Distributed and network-based Processing (PDP 2008). Toulouse, France. February 13-15, 2008. http://www.pdp2008.org/ (PC Member).
  • Special session Security in Networked and Distributed Systems (SNDS 2008) on PDP 2008. Toulouse, France. February 14, 2008. http://www.comsec.spb.ru/SDS08/ (PC Member).
  • The 10th Conference RusCrypto 2008 on Cryptology, Steganography, Digital Signature and Security Systems. Zvenigorod, Russia. April 3-5, 2008. http://www.ruscrypto.ru/ (Session moderator).
  • The 2nd International Conference on Multimedia and Ubiquitous Engineering (MUE 2008). Hanwha Resort Haeundae, Busan, Korea. April 24-26, 2008. (Section Multimedia and Ubiquitous Security). http://www.sersc.org/MUE2008/ (PC Member).
  • 2008 International Workshop on Multimedia Security in Communication (MUSIC'08) Hangzhou, China, August 25th-27th, 2008. http://home.simula.no/~yanzhang/MUSIC/ (PC Member).
  • 2008 International Conference on Hybrid Information Technology (ICHIT'08). Daejeon, Korea. August 28 - 30, 2008, http://www.ichit2008.org (PC Member).
  • The CYBERWORLDS International Conference 2008 (Cyberworlds 2008). Hangzhou, China, September 22-24, 2008. http://www.china-vr.com/cw08/ (Topic: Security) (PC Member).
  • The Third Annual Workshop on Digital Forensics and Incident Analysis (WDFIA 2008). Malaga, Spain, October 9, 2008. http://www.icsd.aegean.gr/wdfia08/ (PC Member).
  • The 5th International Workshop on Formal Aspects in Security&Trust (FAST2008). Malaga, Spain, October 9, 2008 (PC Member).
  • International Workshop on Security and Privacy in Wireless and Mobile Computing, Networking and Communications (SecPri_WiMob 2008). Avignon, France. October 12, 2008. http://www.aegean.gr/SecPri_WiMob_2008 (PC Member).
  • First International Symposium on Multimedia Applications and Processing (MMAP'08). Wisla, Poland, October 20-22, 2008 http://www.imcsit.org/?cont=115&type=page&page=96 (PC Member).
  • 3rd International Workshop on Secure Information Systems (SIS'08). Wisla, Poland, October 20-22, 2008, http://www.imcsit.org/?cont=94&type=page&page=75 (PC Member).
  • The XI International Conference Regional informatics-2008 (RI-2008), St. Petersburg, October 21-23, 2008. http://www.spiiras.nw.ru (PC Member).
  • The First International Conference on u- and e- Service, Science and Technology (UNESST2008). Hainan Island, China. December 13-15, 2008 http://www.sersc.org/UNESST2008/ (PC Member).

2007

  • The Third International Workshop "Information Fusion and Geographical Information Systems (IF&GIS'07)". St.Petersburg, Russia. May 27-29, 2007 (Topic: Information Assurance and Protection in GIS) (PC Member). http://www.oogis.ru/ru/Workshop_2007/workshop_2007.htm
  • The International Conference "Mathematical Methods, Models and Architectures for Computer Networks Security" (MMMACNS-07). St.Petersburg, Russia. September 16-18, 2007. http://www.comsec.spb.ru/mmm-acns07/ (PC Co-Chairman).
  • The IEEE Fourth International Workshop on "Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications" (DAACS'2007), Dortmund, Germany. September 6-8, 2007. http://www.idaacs.net (PC Member).
  • The CYBERWORLDS International Conference 2007 (Cyberworlds 2007). Hannover, Germany. October 24-26. 2007. (Topic: Security) http://www.gdv.uni-hannover.de/hcw07 (PC Member).
  • The 3rd Indian International Conference on Artificial Intelligence (IICAI-07). Pune (PooNay), India. December 17-19, 2007. http://www.iiconference.org (PC Member).
  • 2007 International Conference on Hybrid Information Technology (ICHIT'07). Fukuoka, Japan. November 9th-11th 2007 http://nms.dongguk.ac.kr/ichit2007/ (PC Member).
  • IV-th International Conference "Integrated models and soft computing in Artificial Intelligence". Kolomna, Russia. May 17-19, 2007. http://imscai.rk9.bmstu.ru (PC Member).
  • The Second International Conference on Bio-Inspired Computer Science and Applications (BIONETICS 2007) (Topic: Security from biology). Budapest, Hungary. December 10-12, 2007. http://www.bionetics.org/ (PC Member).
  • The 2nd Annual Workshop on Digital Forensics and Incident Analysis (WDFIA 2007). Samos, Greece, August 27-28, 2007. http://www.aegean.gr/wdfia07 (PC Member).
  • V St.Petersburg Interregional Conference Information Security of Russian Regions (ISRR-2007). St.Petersburg, Russia. October 23-25, 2007. (PC Member).

2006

  • The 3rd International Workshop on Safety and Security in Multiagent Systems (SASEMAS '06). Hakodate, Japan. 8 May, 2006. http://sasemas.org/2006/ (PC Member).
  • The 4th International Workshop on Formal Aspects in Security&Trust (FAST2006). The 14th Formal Methods Symposium (FM'06). Hamilton, Ontario, Canada. August 26-27, 2006. http://www.iit.cnr.it/FAST2006/ (PC Member).
  • 2006 International Conference on Hybrid Information Technology (ICHIT 2006) (Topics: Multi-Scale Modeling and Simulation; Security and Safety Systems). Cheju Island, Korea. November 9-11, 2006. http://www.ichit2006.org/ (PC Member).
  • BIONETICS - International Conference on Bio-Inspired Computer Science and Applications (Topic: Security from biology). Madonna di Campiglio, Italy. December 11-13, 2006. http://www.bionetics.org/ (PC Member).

2001-2005

  • The Third International Workshop on Mathematical Methods, Models and Architectures for Computer Networks Security (MMMACNS-05), St. Petersburg, Russia. September 24-28, 2005 (PC Co-Chairman).
  • The Second International Workshop on Safety and Security in Multiagent Systems (SASEMAS '05). Utrecht, The Netherlands. July 26, 2005 (PC Member).
  • 3rd International Workshop on Formal Aspects in Security & Trust (FAST2005). Newcastle, UK. July 18-19, 2005 (PC Member).
  • IV Inter-regional Conference "Information Security of Russia Regions (ISRR-2005)". St.Petersburg, June 14-16, 2005 (PC Member).
  • The 2nd International Workshop on Security Issues with Petri Nets and other Computational Models (WISP'04). Bologna, Italy. June 26, 2004 (PC Member).
  • III Inter-regional Conference "Information Security of Russia Regions (ISRR-2003)". Saint-Petersburg. November 25-27, 2003 (PC Member).
  • China-Russia Bilateral Conference on Intelligent Information Processing (CRBCIIP-03). Shanghai, China. October 19-23, 2003 (PC Member).
  • The Second International Workshop on Mathematical Methods, Models and Architectures for Computer Network Security (MMMACNS-03), St. Petersburg, Russia. September 21-23, 2003 (PC Member).
  • China-Russia Bilateral Conference on Intelligent Information Processing (CRBCIIP-02). Beijing, China. December 5-10, 2002 (PC Member).
  • International Congress "Artificial Intelligence in XXI century" (ICAI'2001). Divnomorskoe, Russia. September 3-10, 2001 (PC Member).
  • The First International Workshop on Mathematical Methods, Models and Architectures for Computer Network Security (MMMACNS-01), St. Petersburg, Russia. May 21-23, 2001 (PC Member).
Participating in Editorial Board of the following scientific journals: Member of Dissertation Council of SPIIRAS

Top 

Membership in International Societies

Member of
  • Association for Computing Machinery (ACM),
  • IEEE and Computer Societies,
  • Institute for Systems and Technologies of Information, Control and Communication (INSTICC),
  • International Society of Information Fusion (ISIF),
  • Russian and European Associations of Artificial Intelligence (RAAI, EAAI),
  • International scientific, engineering and educational organization dedicated to advancing the arts, sciences and applications of Information Technology and Microelectronics (Euromicro).

Top 

Awards

2017

  • Kotenko Igor Vitalievich - Igor Kotenko, Igor Saenko and Sergey Ageev are a laureates of the best paper award on the The Sixth International Conference on Communications, Computation, Networks and Technologies (INNOV 2017). Athens, Greece, October 8-12, 2017. (https://www.iaria.org/conferences2017/AwardsINNOV17.html).

2016

  • Kotenko Igor Vitalievich - Igor Saenko, Oleg Lauta and Igor Kotenko are laureates of the best paper award at International Symposium of Mobile Internet Security (MobiSec 2016). Taichung, Taiwan. July 14-15, 2016.

2015

  • Kotenko Igor Vitalievich - Alexander Branitskiy and Igor Kotenko are laureates of the best paper award at 18th IEEE International Conference on Computer Science and Engineering (CSE 2015). Porto, Portugal. October 21-23, 2015.

2013

  • Kotenko Igor Vitalievich - Igor Kotenko and Elena Doynikova are a laureates of the best paper award on the IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS'2013). Berlin, Germany, September 12-14, 2013.

2012

  • Kotenko Igor Vitalievich - a laureate of the St. Petersburg Government award (A.S. Popov) for outstanding scientific achievements in the field of science and technology in 2012 (in the electrical and radio engineering, electronics and information technology).

2011

  • Kotenko Igor Vitalievich - The paper "Verification of Security Policy Filtering Rules by Model Checking" of Igor Kotenko and Olga Polubelova got the best paper prize of the conference IDAACS 2011.

2008

  • Kotenko Igor Vitalievich - The 2008 Grant on the program Prominent scientists of Russian Academy of Sciences. Doctors of national science of Russian science support fund.

2007

  • Kotenko Igor Vitalievich - The 2007 Grant on the program Prominent scientists of Russian Academy of Sciences. Doctors of national science of Russian science support fund.

2006

  • Kotenko Igor Vitalievich - Diploma for Best Work in the area of artificial intelligence for 2004-2006 in the nomination of "Applied Research" (Russian Association of Artificial Intelligence (RAAI)).

  • Kotenko Igor Vitalievich - Best student authored paper - Kotenko I., Ulanov A. Simulation of Internet DDoS Attacks and Defense. 9th Information Security Conference. ISC 2006. Samos, Greece. August 30 - September 2, 2006. Proceedings. Lecture Notes in Computer Science, Vol. 4176, 2006. P.327-342.

Top 

Patents and Programms

Patents for inventions and utility models, applications for them

  1. Vasily Desnitsky, Elena Doynikova, Igor Kotenko, Igor Parashchuk, Igor Saenko, Andrey Chechulin. Information retrieval device. Patent No. 2792840. Registered in the State Register of Inventions of the Russian Federation on 27.03.2023. The validity period of the exclusive right to the invention expires on 30.11.2042.
  2. Vasily Desnitsky, Elena Doynikova, Igor Kotenko, Igor Parashchuk, Igor Saenko, Andrey Chechulin. Device for network traffic. Patent No. 2768543. Registered in the State Register of Inventions of the Russian Federation on 24.03.2022. The validity period of the exclusive right to the invention expires on 07.04.2041.
  3. Vasily Desnitsky, Elena Doynikova, Igor Kotenko, Igor Parashchuk, Igor Saenko, Andrey Chechulin. Device for parametric estimation of the distribution law of message streams. Patent No. 2750287. Registered in the State Register of Inventions of the Russian Federation on 25.06.2021. The validity period of the exclusive right to the invention expires on 11.07.2040.
  4. Vasily Desnitsky, Igor Kotenko, Igor Parashchuk, Igor Saenko, Andrey Chechulin, Elena Doynikova. Information retrieval device. Patent No. 2724788. Registered in the State Register of Inventions of the Russian Federation on 25.06.2020. The validity period of the exclusive right to the invention expires on 14.10.2039.

  5. Vasily Desnitsky, Igor Kotenko, Igor Parashchuk, Igor Saenko, Andrey Chechulin. Random event prediction device. Patent No. 2705010. Registered in the State Register of Inventions of the Russian Federation on 01.11.2019. The validity period of the exclusive right to the invention expires on 14.02.2039.

  6. Vasily Desnitsky, Igor Kotenko, Igor Parashchuk, Igor Saenko, Andrey Chechulin. Information retrieval device. Patent No. 2656736. Registered in the State Register of Inventions of the Russian Federation on 06.06.2018. The validity period of the exclusive right to the invention expires on 27.06.2037.

Programs and databases

2021

  1. Maxim Kolomeec, Andrey Chechulin, Igor Kotenko. Decision support component for the countermeasures selection for malicious influence on social networks. Certificate No. 2021617410. Registered in the Computer Program Registry 14.05.2021.
  2. Lidia Vitkova, Igor Kotenko. Component of expert assessment and ranking of countermeasures to malicious information in social networks . Certificate No. 2021617407. Registered in the Computer Program Registry 14.05.2021.

2020

  1. Konstantin Izrailov, Igor Kotenko, Igor Saenko. Component for analytical modeling of multi-step network attacks based on a state machine. Certificate No 2020660519. Program Registry 04.09.2020.

  2. Andrey Chechulin, Igor Kotenko, Ksenia Zhernova. A component for detecting multi-step network attacks based on analytical modeling. Certificate No 2020660703. Program Registry 10.09.2020.

  3. Maxim Kolomeets, Andrey Chechulin, Igor Kotenko Software tool which implements visual interfaces for detection and counteraction of inappropriate, dubious and harmful information. Certificate No. 2020665787. Registered in the Computer Program Registry 01.12.2020.

  4. Anton Pronoza, Andrey Chechulin, Igor Kotenko Component for the community analysis in a social network. Certificate No. 2020665856. Registered in the Computer Program Registry 01.12.2020.

  5. Nickolay Komashinskiy, Igor Kotenko Component for the parallel processing of network traffic using a combination of Snort and Hadoop technologies. Certificate No. 2020665722. Registered in the Computer Program Registry 30.11.2020.

  6. Ksenia Zhernova, Igor Kotenko Software for the effectiveness evaluation of human-machine interaction based on touch screens. Certificate No. 2020665837. Registered in the Computer Program Registry 01.12.2020.

  7. Alexander Branitskiy, Elena Fedorchenko, Igor Kotenko Component for the destructive influences detection based on text classifiers in social network groups . Certificate No. 2020666158. Registered in the Computer Program Registry 04.12.2020.

  8. Lidia Vitkova, Elizaveta Berezina, Aleksei Pronichev, Igor Saenko, Igor Kotenko. Database for accounting of unwanted information together with countermeasures. Certificate No. 2020665857. Registered in the Computer Program Registry 08.12.2020.

  9. Vasily Desnitsky, Igor Parashchuk., Igor Kotenko. Data processing component of the parental control system for digital content on the Internet. Certificate No. 2020666736. Registered in the Computer Program Registry 16.12.2020.

2019

  1. Dmitry Levshun, Andrey Chechulin, Igor Kotenko. Application for the analysis of the constructive, destructive and deficit components of the user's I-functions based on Ammons I-structural test. Certificate No 2019664059. Registered in the Computer Program Registry 30.10.2019.

  2. Elena Doynikova, Igor Kotenko. A component for calculating metrics to support decision making on countering inappropriate information on the Internet. Certificate No 2019664198. Registered in the Computer Program Registry 01.11.2019.

  3. Alexander Branitskiy, Elena Doynikova, Igor Kotenko. Neural network module for users of a social network classification according to the psychological scales of the Ammon's test. Certificate No 2019664410. Registered in the Computer Program Registry 06.11.2019.

  4. Lidia Vitkova, Andrey Chechulin, Igor Kotenko. A component of user segmentation by their activity on social networks. Certificate No. 2019664733. Registered in the Register of computer programs on 13.11.2018.

  5. Ksenia Zhernova, Igor Kotenko. Touch interface for monitoring computer network security. Certificate No. 2019666536. Registered in the Computer Program Registry 11.12.2019.
  6. Ksenia Zhernova, Igor Kotenko. Multi-touch gesture recognition component for touch screen. Certificate No. 2019666461. Registered in the Computer Program Registry 10.12.2019.
  7. Andrey Fedorchenko, Diana Gayfulina, Igor Kotenko. A software component for the structural analysis of network information objects in a system of distributed intelligent scanners. Certificate No. 2019666070. Registered in the Computer Program Registry 04.12.2019.
  8. Dmitry Levshun, Igor Kotenko, Igor Saenko. Software implementation of the procedure for verification of access control policies based on attributes in the UPPAAL environment. Certificate No. 2019666578. Registered in the Computer Program Registry on 12.12.2019.

2018

  1. Vasily Desnitsky, Igor Kotenko. Module of analysis of unwanted information flows in information systems. Federal Service for Intellectual Property. Certificate No 2018663497. Registered in the Computer Program Registry 29.10.2018.

  2. Maxim Kolomeec, Andrey Chechulin, Igor Kotenko. Component for visualization of communication graphs of social network objects using augmented reality technology. Federal Service for Intellectual Property. Certificate No 2018663594. Registered in the Computer Program Registry 31.10.2018.

  3. Andrey Chechulin, Igor Kotenko. Component for definition of web page categories on the base of text features. Federal Service for Intellectual Property. Certificate No 2018663639. Registered in the Computer Program Registry 01.11.2018.

  4. Elena Doynikova, Andrey Fedorchenko, Igor Kotenko. Component for ranking measures to counter remote information in the Internet. Federal Service for Intellectual Property. Certificate No 2018663642. Registered in the Computer Program Registry 01.11.2018.

  5. Maxim Kolomeec, Andrey Chechulin, Igor Kotenko. The module of human-computer interaction with the information panel of the computer network visualization system. Federal Service for Intellectual Property. Certificate No 2018663862. Registered in the Computer Program Registry 06.11.2018.

  6. Maxim Kolomeec, Andrey Chechulin, Igor Kotenko, Igor Saenko. The component of the role-based access control model visualization based on triangular matrices. Federal Service for Intellectual Property. Certificate No 2018663991. Registered in the Computer Program Registry 08.11.2018.

2017

  1. Elena Doynikova, Igor Kotenko, Igor Saenko. Subsystem for countermeasures automatic selection in computer networks based on graph models in static and dynamic modes of operation. Federal Service for Intellectual Property. Certificate No 2017619725. Registered in the Computer Program Registry 01.09.2017.

  2. Mikhail Bulgakov, Andrey Chechulin, Igor Kotenko. Component for data extraction from control channels of railway model. Federal Service for Intellectual Property. Certificate No 2017660182. Registered in the Computer Program Registry 19.09.2017.

  3. Vasily Desnitsky, Igor Kotenko, Andrey Chechulin. Processing of security events from the cyberphysical water supply management system. Federal Service for Intellectual Property. Certificate No 2017660183. Registered in the Computer Program Registry 19.09.2017.

  4. Alexander Branitskiy, Igor Kotenko, Igor Saenko. Frontend-interface of network attack generator. Federal Service for Intellectual Property. Certificate No 2017660184. Registered in the Computer Program Registry 19.09.2017.

  5. Maxim Kolomeec, Andrey Chechulin, Igor Kotenko. Visual interface for Smart home security system management. Federal Service for Intellectual Property. Certificate No 2017661653. Registered in the Computer Program Registry 17.10.2017.

  6. Andrey Fedorchenko, Igor Kotenko, Igor Saenko. Agent for Windows security events collection with a function of selective anonymization of transmitted information. Federal Service for Intellectual Property. Certificate No 2017619728. Registered in the Computer Program Registry 01.09.2017.

  7. Dmitry Levshun, Igor Kotenko, Andrey Chechulin. Repository for heterogeneous data from the hardware elements of the smart home. Federal Service for Intellectual Property. Certificate No 2017620996. Registered in the database Registry 01.09.2017.

  8. Vasily Desnitsky, Igor Kotenko, Igor Parashchuk. Managing of the security of a wireless mesh-network. Federal Service for Intellectual Property. Certificate No 2017661289. Registered in the Computer Program Registry 09.10.2017.

2016

  1. Dmitry Levshun, Andrey Chechulin, Igor Kotenko. System for support and management of database of the room access control and management system based on the contactless smart cards. Federal Service for Intellectual Property. Certificate No 2016612543. Registered in the Computer Program Registry 01.03.2016.

  2. Maxim Kolomeets, Andrey Chechulin, Igor Kotenko. Component for network security metrics visualization using matrices. Certificate 2016614487. Registered in the Computer Program Registry 25.04.2016.

  3. Igor Saenko, Andrey Chechulin, Igor Kotenko, Fadey Skorik. Software for operational classification of data about the network status based on the using of artificial neural networks. Certificate 2016614485. Registered in the Computer Program Registry 25.04.2016.

  4. Igor Saenko, Igor Kotenko, Vladimir Avramenko, Daniil Bobreshov-Shishov. Software for information security evaluation on the basis of expert assessment of unauthorized access threats in automated systems. Certificate 2016614484. Registered in the Computer Program Registry 25.04.2016.

  5. Elena Doynikova, Igor Kotenko. Component for information security risks evaluation for network assets based on security events analysis. Certificate 201614489. Registered in the Computer Program Registry 25.04.2016.

  6. Igor Kotenko, Maxim Kolomeets, Andrey Chechulin. Component for creation of patterns and retrieval of information objects and relationships between them for visualization of unformalized data with heterogeneous structure. Certificate 2016663182. Registered in the Computer Program Registry 29.11.2016.

  7. Maxim Kolomeets, Andrey Chechulin, Igor Kotenko. Component for retrieval of information objects and links between them based on patterns, normalization and reducing of the dimension of the information objects and for forming a multi-dimensional matrix of connections between information objects. Certificate 2016663963. Registered in the Computer Program Registry 20.12.2016.

  8. Dmitry Levshun, Andrey Chechulin, Igor Kotenko. Component implementing the network level of interaction between the controllers based on the I2C protocol. Federal Service for Intellectual Property. Certificate N 2016663951. Registered in the database Registry 20.12.2016.

  9. Mikhail Bulgakov, Andrey Chechulin, Igor Kotenko. Component for DCC protocol analysis for implementing the railways as the obhect of security incident management. Federal Service for Intellectual Property. Certificate N 2016663840. Registered in the database Registry 19.12.2016.

  10. Igor Saenko, Alexei Kushnerevuch, Igor Kotenko, Andrey Chechulin. Component for analysis of big data sets for the computer networks security monitoring. Certificate 2016663929. Registered in the Computer Program Registry 19.12.2016.

  11. .., .., .. . 2016663498. 08.12.2016.
  12. .., .. . 2016663492. 08.12.2016.
  13. .., .. . 2016663476. 08.12.2016.
  14. .., .. . 2016663477. 08.12.2016.

2015

  1. Igor Kotenko, Andrey Chechulin. Attack graph visualization module for network security evaluation system. Federal Service for Intellectual Property. Certificate No 2015615640. Registered in the Computer Program Registry 22.05.2015.

  2. Andrey Chechulin, Igor Kotenko. Network topology visualization module for security information and event management in information and telecommunication systems. Federal Service for Intellectual Property. Certificate No 2015615773. Registered in the Computer Program Registry 22.05.2015.

  3. Elena Doynikova, Igor Kotenko. Component for assessment of the assests criticality on the base of service dependencies model for testing of the security components of networks of Internet of Things. Certificate No 2015615374. Registered in the Computer Program Registry 24.03.2015.

  4. Vasily Desnitsky, Igor Kotenko. Component for gathering data on a system for design, verification and testing security components of information and telecommunication Internet of Things systems. Certificate No 2015615411. Registered in the Computer Program Registry 18.05.2015.

  5. Andrey Fedorchenko, Igor Kotenko. Access and management services for the integrated vulnerability database for the security monitoring and management in information and telecommunication systems. Federal Service for Intellectual Property. Certificate N 2015615366. Registered in the Computer Program Registry 15.05.2015.

  6. Maxim Kolomeets, Andrey Chechulin, Igor Kotenko. Room access control and management server based on the contactless smart cards. Federal Service for Intellectual Property. Certificate No 2015662190. Registered in the Computer Program Registry 18.11.2015.

  7. Andrey Fedorchenko, Andrey Chechulin. The statistics analisys and qualitative parameters evoluation component of integrated vulnerability database. Federal Service for Intellectual Property. Certificate N 2015662208. Registered in the Computer Program Registry 18.11.2015.

  8. Igor Saenko, Andrey Chechulin, Sergey Ageev, Igor Kotenko. Classifier of states of computer network elements for risk assessment of information security threats. Federal Service for Intellectual Property. Certificate N 2015662186. Registered in the database Registry 18.11.2015.

  9. Andrey Chechulin, Igor Kotenko. Component of the attack modeling for the protection of the information and telecommunication systems. Federal Service for Intellectual Property. Certificate N 2015662484. Registered in the database Registry 25.11.2015.

  10. Alexander Branitskiy, Igor Kotenko. Adaptive intrusion detection system based on hybridization methods of computational intelligence. Federal Service for Intellectual Property. Certificate No 2015662189. Registered in the Computer Program Registry 18.11.2015.

  11. Vasily Desnitsky, Igor Kotenko. A software tool for evaluation of effectiveness of configuring security components of Internet of Things systems. Certificate N 2015662025. Registered in the Computer Program Registry 16.11.2015.

2014

  1. Igor Kotenko, Elena Doynikova, Andrey Chechulin. Calculation of the security metrics for the monitoring of the current security state of information and telecommunication systems for the deision support of the responses on the security incidents. Federal Service for Intellectual Property. Certificate No 2014661026. Registered in the Computer Program Registry 22.10.2014.

  2. Igor Kotenko, Andrey Chechulin. Malefactor model formation for security evaluation of information and telecommunication systems. Federal Service for Intellectual Property. Certificate No 2014661028. Registered in the Computer Program Registry 22.10.2014.

  3. Vasily Desnitsky, Igor Kotenko. Verificataion of network information flows for protection of information and telecommunication systems with embedded devices. Federal Service for Intellectual Property. Certificate No 2014661027. Registered in the Computer Program Registry 22.10.2014.

2013

  1. Igor Kotenko, Vasily Desnitsky. Configurator of protection system of embedded devices. Federal Service for Intellectual Property. Certificate No 2013612691. Registered in the Computer Program Registry 11.03.2013 .
  2. Olga Polubelova, Igor Kotenko. Verifier of filtering rules of security policy. Federal Service for Intellectual Property. Certificate No 2013612707. Registered in the Computer Program Registry 11.03.2013 .
  3. Igor Kotenko, Andrey Shorov. Simulator of botnets and defense mechanisms against them. Federal Service for Intellectual Property. Certificate No 2013612788. Registered in the Computer Program Registry 13.03.2013.
  4. Evgenia Novikova, Igor Kotenko. System for visualization of logs of mobile money transfer service. Federal Service for Intellectual Property. Certificate No 2013660999. Registered in the Computer Program Registry 26.11.2013 .

2012

  1. Igor Kotenko, Andrey Chechulin, Mikhail Stepashkin. Designer of specifications of computer networks. Certificate No.2012615244. Registered in the Computer Program Registry 9.07.2012.

  2. Igor Kotenko, Andrey Chechulin, Mikhail Stepashkin. System of security analysis of computer networks. Certificate No.2012615245. Registered in the Computer Program Registry 9.07.2012.

  3. Igor Kotenko, Andrey Chechulin, Mikhail Stepashkin. Update of vulnerability database. Certificate No.2012615247. Registered in the Computer Program Registry 9.07.2012.

Top 

Projects

Current Grants and Projects

Former Projects

  • Andrey Chechulin (Principal Investigator). Grant of Russian Science Foundation 18-71-10094-P "Monitoring and counteraction to malicious influence in the information space of social networks", 2021-2023 (Researcher).
  • Igor Kotenko (Principal Investigator). "Models, techniques and methodology for design and verification of secure cyber-physical systems". Research grant # 19-37-90082 "PhD students" of Russian Foundation of Basic Research, 2019-2022 (Advisor).
  • Igor Kotenko (Principal Investigator) State Contract No. 05.607.21.0322 "Development of methods, models, algorithms and software tools based on detecting deviations in heuristics of ultra-high volume traffic to detect network attacks and protect against them". Project of Russian Ministry of Education and Science in scope of the Program "Research and development in priority directions of evolution of the scientific and technological complex of Russia on 2014-2020", 2019-2020 (Principal Investigator).
    Report-FTP-Results-05.607.21.0322.pdf [application/pdf] (204912 bytes)
  • Igor Kotenko (Principal Investigator). "Visual analytics for information security: methods, models and applications". Research grant # 19-17-50173 of Russian Foundation of Basic Research, 2019-2020 (Principal Investigator).
  • Andrey Chechulin (Principal Investigator). Grant of Russian Science Foundation 18-71-10094 "Monitoring and counteraction to malicious influence in the information space of social networks", 2018-2021 (Main researcher).
    RSCF_18-71-10094_Report_2020_eng.pdf [application/pdf] (196723 bytes)
    RSCF_18-71-10094_Report_2020_rus.pdf [application/pdf] (258925 bytes)
    RSCF_18-71-10094_Report_2021_eng.pdf [application/pdf] (178723 bytes)
    RSCF_18-71-10094_Report_2021_rus.pdf [application/pdf] (194835 bytes)
  • Igor Kotenko (Principal Investigator). "Monitoring and identification of destructive information impacts and negative personal tendencies of the younger generation when interacting with the Internet space on the basis of methods of neurocomputer and neural network processing of Internet content" Research grant # 18-29-22034 of Russian Foundation of Basic Research, 2018-2021 (Principal Investigator).
    Report-2019-18-29-22034-short.pdf [application/pdf] (147123 bytes)
    Report-2020-18-29-22034-short.pdf [application/pdf] (356989 bytes)
  • Igor Saenko (Principal Investigator). Grant of Russian Science Foundation 18-11-00302 "Intelligent digital network content processing for effective detection and counteraction of inappropriate, dubious and harmful information", 2018-2020 (Main researcher).
    RSF-Results-2018-18-11-00302-Eng.pdf [application/pdf] (94208 bytes)
    RSF-Results-2018-18-11-00302-Rus.pdf [application/pdf] (245760 bytes)
  • Igor Kotenko (Principal Investigator). Models, methods, techniques and algorithms of human-machine interaction to support visual analytics of network security of critical infrastructures using multitouch screens. Research grant # 18-07-01488-a of Russian Foundation of Basic Research, 2018-2020 (Principal Investigator).
    Report-2018-18-07-01488-a-short.pdf [application/pdf] (1363968 bytes)
    Report-2019-18-07-01488-a-short.pdf [application/pdf] (400135 bytes)
    Report-2020-18-07-01488-a-short.pdf [application/pdf] (551842 bytes)
  • Igor Kotenko (Principal Investigator). NIR-FUND of ITMO University 717075 "Methods, Models, Methods, Algorithms, Protocols and Applications for ensuring Information Security of Cyber-Physical Systems", 2017-2019 (Researcher).
  • Igor Kotenko (Principal Investigator) Grant of Russian Science Foundation 15-11-30029 "Incident management and counteraction against targeted cyber-physical attacks in distributed largescaled mission critical systems taking into account cloud services and networks of the Internet of Things", 2015-2017., 2015-2017 (Principal Investigator).
    RSF-Results-2015-15-11-30029-Eng.pdf [application/pdf] (18843 bytes)
    RSF-Results-2015-15-11-30029-Rus.pdf [application/pdf] (128851 bytes)
    RSF-Results-2016-15-11-30029-Eng.pdf [application/pdf] (327680 bytes)
    RSF-Results-2016-15-11-30029-Rus.pdf [application/pdf] (442368 bytes)
    RSF-Results-2017-15-11-30029-Eng.pdf [application/pdf] (327680 bytes)
    RSF-Results-2017-15-11-30029-Rus.pdf [application/pdf] (438272 bytes)
  • ENGENSEC
    Igor Kotenko (Principal Investigator from SPIIRAS). Educating the Next generation experts in Cyber Security: the new EU-recognized Masters program. Research Project of the European Community program TEMPUS 544455-TEMPUS-1-2013-1-SE-TEMPUS-JPCR (http://engensec.eu/), 2014-2016 (Principal Investigator).
  • Igor Kotenko (Principal Investigator) State Contract No. 14.604.21.0137 "Development of the technologies of the interactive visualization of the unformalized heterogeneous data for decision support systems in scope of the information security monitoring and management in the information and telecommunication systems". Project of Russian Ministry of Education and Science in scope of the Program "Research and development in priority directions of evolution of the scientific and technological complex of Russia on 2014-2020", 2014-2016., 2014-2016 (Principal Investigator).
    14.604.21.0137_current_status.pdf [application/pdf] (138103 bytes)
  • Igor Kotenko (Principal Investigator) State Contract No. 14.604.21.0147 "Development of the methods for aggregation, normalization, analysis and visualization of big arrays of the heterogeneous, structured, semi-structured and unstructured data for the security monitoring and management of the distributed network of the electronic consumer devices". Project of Russian Ministry of Education and Science in scope of the Program "Research and development in priority directions of evolution of the scientific and technological complex of Russia on 2014-2020", 2014-2016., 2014-2016 (Principal Investigator).
    14.604.21.0147_current_status.pdf [application/pdf] (142791 bytes)
  • Igor Kotenko (Principal Investigator). State Contract No. 14.604.21.0033 Models, methods and software for development and analysis of information-telecommunication system security components for Internet of Things concept. Project of Russian Ministry of Education and Science in scope of the Program "Research and development in priority directions of evolution of the scientific and technological complex of Russia on 2014-2020", 2014-2015., 2014-2015 (Principal Investigator).
    14.604.21.0033_current_status [application/pdf] (262992 bytes)
  • Igor Kotenko (Principal Investigator) State Contract No. 14.616.21.0028 "Perspective methods of correlation of the security information and incidents management information in the critical infrastructures on the base of the convergence of the technologies of the security awareness on the physical and logical levels". Project of Russian Ministry of Education and Science in scope of the Program "Research and development in priority directions of evolution of the scientific and technological complex of Russia on 2014-2020", 2014., 2014-2014 (Principal Investigator).
  • Igor Kotenko (Principal Investigator). Mathematical models and methods for monitoring and management of information security in computer networks and systems of critical infrastructures based on intelligent services of information protection. Research grant # 13-01-00843-a of Russian Foundation of Basic Research, 2013-2015 (Principal Investigator).
    Report-2013-13-01-00843-a-short.pdf [application/pdf] (294747 bytes)
    Report-2014-13-01-00843-a-short.pdf [application/pdf] (761856 bytes)
    Report-2015-13-01-00843-a-short.pdf [application/pdf] (562916 bytes)
  • Igor Kotenko (Principal Investigator). Methods for the synthesis of the distributed intelligent system of information and technological security of automated control systems for railways. Research grant # 13-07-13159-ofi_m_RJD of Russian Foundation of Basic Research, 2013-2014 (Principal Investigator).
  • Igor Kotenko (Principal Investigator). Mathematical models, methods and algorithms of attack modeling, computer systems and networks protection analysis, information security risk analysis and decision-making for selection of security mechanisms in computer systems and networks. Program "Architectural and software solutions, and security of data-processing supercomputer complexes of new generations" of the Russian Academy of Sciences Branch "Nanotechnologies and Information Technologies", 2012-2014 (Principal Investigator).
  • Igor Kotenko (Principal Investigator). Project in agreement with F-Secure corporation, 2012-2013 (Principal Investigator).
  • Igor Kotenko (Principal Investigator). State Contract No. 11.519.11.4008 Research and development of methods, models and algorithms of intellectualizing the secirity services in critical infrastructures. Project of Russian Ministry of Education and Science, 2011-2013 (Principal Investigator).
  • Igor Kotenko (Principal Investigator). Mathematical models and methods of integrated protection against network attacks and malware in computer networks and systems based on hybrid multi-agent modeling and simulation of computer counteraction, verified adaptive security policies and proactive monitoring by data mining. Research grant # 10-01-00826-a of Russian Foundation of Basic Research, 2010-2013 (Principal Investigator).
    Report-2010-10-01-00826-a-short.pdf [application/pdf] (191714 bytes)
    Report-2011-10-01-00826-a-short.pdf [application/pdf] (260794 bytes)
    Report-2012-10-01-00826-a-short.pdf [application/pdf] (348160 bytes)
  • Igor Kotenko (Principal Investigator from SPIIRAS). Design of Secure and energy-efficient embedded systems for Future internet applications (SecFutur). Research Project of the European Community seventh framework program (FP7). Contract No. 256668 (http://www.secfutur.eu/), 2010-2013 (Principal Investigator).
  • Igor Kotenko (Principal Investigator from SPIIRAS). MAnagement of Security information and events in Service InFrastructures (MASSIF). Research Project of the European Community seventh framework program (FP7). Contract No. 257475 (http://www.massif-project.eu/), 2010-2013 (Principal Investigator).
  • Igor Kotenko (Principal Investigator). Project in agreement with F-Secure corporation, 2010-2011 (Principal Investigator).
  • Igor Kotenko (Principal Investigator). Mathematical Models, Methods and Algorithms of Proactive Protection against Malware in Computer Networks and Systems. Program "Architecture, system solutions, software, standardization and information security of computer complexes of new generations" of the Russian Academy of Sciences Branch "Nanotechnologies and Information Technologies", 2009-2011 (Principal Investigator).
  • Igor Kotenko (Principal Investigator). Project in agreement with F-Secure corporation, 2009-2009 (Principal Investigator).
  • Igor Kotenko (Principal Investigator). Project on demand of Section of Applied Problems of Russian Academy of Sciences. Governmental contract, 2008-2009 (Principal Investigator).
  • Igor Kotenko (Principal InvestigatorModels and methods of construction and functioning support of intelligent adaptive security systems based on modeling and simulation of security systems behavior, realization of verified security policies, security evaluation and proactive monitoring. Research grant # 07-01-00547 of Russian Foundation of Basic Research, 2007-2009 (Principal Investigator).
    Report-07-01-00547a-2007short.pdf [application/pdf] (193198 bytes)
    Report-07-01-00547a-2008short.pdf [application/pdf] (205945 bytes)
    Report-07-01-00547a-2009short.pdf [application/pdf] (943498 bytes)
  • Igor Kotenko (Principal Investigator from SPIIRAS). Remote EnTrusting by RUn-time Software authentication (RE-TRUST). Research Project of the European Community sixth framework program, 2006-2009 (Principal Investigator from SPIIRAS).
  • Igor Kotenko (Principal Investigator). Automatic Detection and Response Techniques against Internet Worms. The subcontract with International Research Institute for Advanced Systems (IRIAS) according to contract with Hewlett-Packard, 2006-2007 (Principal Investigator).
  • Igor Kotenko (Principal Investigator). Development of scientific-methodical bases of information protection in the communication channels of International collective ecological safety system. The state contract with the Center of security problems research of the Russian Academy of Sciences, 2006-2006 (Principal Investigator).
  • Oleg Karsaev (Principal Investigator from SPIIRAS). MIND - Machine Learning for Intrusion Detection. Institute Fraunhofer First, Berlin, Germany, 2004-2006 (Researcher).
  • Igor Kotenko (Principal Investigator). Modeling of information security processes in computer networks in adversarial environment: formal framework, mathematical models, multi-agent architecture, software prototype and experimental evaluation. Research grant 04-01-00167 of Russian Foundation of Basic Research, 2004-2006 (Principal Investigator).
    Report-04-01-00167a-2006.pdf [application/pdf] (446259 bytes)
    Report-04-01-00167a.pdf [application/pdf] (510438 bytes)
  • Igor Kotenko (Principal Investigator). Network traffic preprocessing algorithms. INTEL, 2004-2005 (Principal Investigator).
  • Igor Kotenko (Principal Investigator). Monitoring of user activity in computer networks. Contract for Centre of Information Technologies and Systems of Executive State Authorities, Russia, 2004-2004 (Principal Investigator).
  • Igor Kotenko (Principal Investigator). Mathematical Models of Active Analysis of Vulnerabilities, Intrusion Detection and Network Attacks Counteraction in Computer Networks based on Multi-agent Technologies. Program "Optimization of computer architectures to particular classes of tasks, information assurance of network technologies" of the Russian Academy of Sciences Branch "Nanotechnologies and Information Technologies"., 2003-2008 (Principal Investigator).
  • Igor Kotenko (Principal Investigator from SPIIRAS). Policy-based Security Tools and Framework (POSITIF). Research Project of the European Community sixth framework program. Contract # IST-2002-002314, 2003-2007 (Principal Investigator from SPIIRAS).
  • Igor Kotenko (Principal Investigator). Software Prototype of Deception System. Contract # 1/0308- for Centre of Information Technologies and Systems of Executive State Authorities, Russia, 2003-2004 (Principal Investigator).
  • Igor Kotenko (Principal Investigator). Mathematical Foundations, Architecture and Principles of Implementation of Multi-Agent Learning Components for Attack Detection Computer Networks. Contract for European Office of Aerospace Research and Development, ISTC, 2001-2003 (Principal Investigator).
    1994-2001-Task2-en.pdf [application/pdf] (151228 bytes)
    1994-2001-Task2-ru.pdf [application/pdf] (225220 bytes)
    1994-2002-Task2-en.pdf [application/pdf] (206860 bytes)
    1994-2002-Task2-ru.pdf [application/pdf] (315097 bytes)
    1994-2003-Task2-en.pdf [application/pdf] (135652 bytes)
    1994-2003-Task2-ru.pdf [application/pdf] (384850 bytes)
  • Igor Kotenko (Principal Investigator). Formal Grammar-Based Approach and Tool for Simulation Attacks against Computer Network. Contract for European Office of Aerospace Research and Development, ISTC, 2001-2003 (Principal Investigator).
    1994-2001-Task1-en.pdf [application/pdf] (159554 bytes)
    1994-2001-Task1-ru.pdf [application/pdf] (211870 bytes)
    1994-2002-Task1-en.pdf [application/pdf] (207362 bytes)
    1994-2002-Task1-ru.pdf [application/pdf] (294571 bytes)
    1994-2003-Task1-en.pdf [application/pdf] (68592 bytes)
    1994-2003-Task1-ru.pdf [application/pdf] (300009 bytes)
  • Igor Kotenko (Principal Investigator). Mathematical Models of Information Security Assurance in Computer Networks based on Multi-agent Technologies and their Experimental Evaluation. Research grant 01-01-00108 of Russian Foundation of Basic Research, 2001-2003 (Principal Investigator).
    RFBR-2003-FORM501-ru.pdf [application/pdf] (60135 bytes)
    RFBR-2003-FORM502-en.pdf [application/pdf] (7885 bytes)
  • Vladimir Gorodetski (Principal Investigator). Agent-Based Model of Information Security System: Architecture and Formal Framework for Coordinated Intelligent Agents Behavior Specification. Contract for European Office of Aerospace Research and Development, ISTC, 1999-2001 (Researcher).

Top 

Main publications

Books and Chapters in Books

  1. Elena Doynikova, Igor Kotenko. Assessment of security and choice of countermeasures for cybersecurity management // Moscow, 2021. monograph. 184 p. // https://elibrary.ru/item.asp?id=47416769
  2. Igor Kotenko, Igor Saenko, Andrey Chechulin, Olga Polubelova, Evgenia Novikova, Elena Doinikova, Andrey Shorov, Vasily Desnitsky. Intelligent information security services in critical infrastructures. Monography / Ed. Igor Kotenko and Igor Sayenko. St. Petersburg: BHV Publishing House, 2019. 400. ISBN 978-5-9775-3968-5 https://www.elibrary.ru/item.asp?id=42927796 // https://elibrary.ru/item.asp?id=42927796
  3. Igor Kotenko, Andrey Fedorchenko, Elena Doynikova. Data analytics for security management of complex heterogeneous systems: event correlation and security assessment tasks // Chapter in book Advances in Cyber Security Analytics. Shishir K. Shandilya (Ed.). Springer. 2019. (WoS and Scopus).
  4. Andrey Fedorchenko, Elena Doynikova, Igor Kotenko. Towards Intelligent Data Processing for Automated Determination of Information System Assets // Chapter in book Handbook of Research on Intelligent Data Processing and Information Security Systems. IGI Global. 2019. ISBN13: 9781799812906. ISBN10: 1799812901. EISBN13: 9781799812920. pp. 147-160. DOI: 10.4018/978-1-7998-1290-6.ch007. (Scopus)
  5. Kotenko I., Saenko I., Branitskiy A. Machine Learning and Big Data Processing for Cybersecurity Data Analysis // Chapter in book Data Science in Cybersecurity and Cyberthreat Intelligence. Leslie F. Sikos and Kim-Kwang Raymond Choo (Eds.). Springer. 2019.
  6. Alexander Branitskiy, Igor Kotenko I. Applying Artificial Intelligence Methods to Network Attack Detection // AI in Cybersecurity. Springer, Cham. 2019. pp. 115-149.
  7. Andrey Krasov, Artem Gelfand, Valery Korzhik, Igor Kotenko, Roman Petriv, Dmitry Sakharov, Igor Ushakov, Pavel Sharikov, Dmitry Yurkin. Building a trusted computer environment // Saint Petersburg, 2019. monograph, number of pages: 108 ISBN 978-5-6043143-2-6 // https://www.elibrary.ru/item.asp?id=41448110
  8. I.V. Kotenko, I.B. Saenko. Generation of access-control schemes in computer networks based on genetic algorithms // : Nature-Inspired Cyber Security and Resiliency. 2019. . 409-438. DOI: 10.1049/PBSE010E_ch16 // https://www.elibrary.ru/item.asp?id=47517901
  9. Igor Kotenko, Elena Doynikova, Andrey Chechulin, Andrey Fedorchenko. AI- and Metrics-Based Vulnerability-Centric Cyber Security Assessment and Countermeasure Selection: An Artificial Intelligence Approach //Chapter in book: Guide to Vulnerability Analysis for Computer Networks and Systems - An Artificial Intelligence Approach. S. Parkinson, A. Crampton, R. Hill (eds). Springer, Cham, 2018. P.101-130. DOI: https://doi.org/10.1007/978-3-319-92624-7_5. Print ISBN 978-3-319-92623-0. Online ISBN 978-3-319-92624-7 (WoS and Scopus).
  10. Igor Kotenko, Igor Saenko, Oleg Lauta. Modeling the Impact of Cyber Attacks // Chapter in book: Cyber Resilience of Systems and Networks, Risk, Systems and Decisions, A. Kott, I. Linkov (eds.), Springer, First Online: 30 May 2018. P.135-169. https://doi.org/10.1007/978-3-319-77492-3_7 (WoS and Scopus).
  11. Evgenia Novikova, Igor Kotenko. Visualization-Driven Approach to Fraud Detection in the Mobile Money Transfer Services // Chapter in book: Algorithms, Methods and Applications in Mobile Computing and Communications. IGI Global. Release Date: July, 2018. P.205-236. DOI: 10.4018/978-1-5225-5693-0.ch009 (WoS and Scopus).
  12. Alexander Branitskiy, Igor Kotenko. Applying Artificial Intelligence Methods to Network Attack Detection // Chapter in book: AI in Cybersecurity, L. F. Sikos (ed.), Springer, Intelligent Systems Reference Library, 2019, Vol.151. P.115149. https://doi.org/10.1007/978-3-319-98842-9_5(WoS and Scopus).
  13. Andrey Fedorchenko, Igor Kotenko. Iot security event correlation based on the analysis of event types // : Dependable IoT for Human and Industry: Modeling, Architecting, Implementation. 2018. . 147-168. // https://elibrary.ru/item.asp?id=41627299 (WoS and Scopus).
  14. Kotenko I.V., Saenko I.B., Chechulin A.A. Protection against unwanted and malicious information in global information networks // Information-psychological and cognitive security. Collective monograph / Ed. I. F. Kefeli, R. M. Yusupova. St. Petersburg .: Publishing house "Aurora" 2017. 300 P. - 175-194 // https://elibrary.ru/item.asp?id=37414463
  15. Igor Kotenko, Alexey Konovalov, Andrey Shorov. Discrete-Event Simulation of Botnet Protection Mechanisms. Discrete Event Simulations - Development and Applications. Edited by Eldin Wee Chuan Lim. Rijeka, Croatia: InTech. 2012 P.143-168.
  16. Igor Kotenko, Rafal Leszczyna. Software agents for network security. NATO Science for Peace and Security Series, Software Agents, Agent Systems and Their Applications, Volume 32, 2012. Edited by M.Essaaidi, M.Ganzha, and M.Paprzycki. Amsterdam, Netherlands: IOS Press. IOS Press. 2012. P. 260-285.
  17. Leszczyna R., Kotenko I. Security and anonymity of agent systems // NATO Science for Peace and Security Series, Software Agents, Agent Systems and Their Applications, Volume 32, 2012. Edited by M.Essaaidi, M.Ganzha, and M.Paprzycki. Amsterdam, Netherlands: IOS Press. IOS Press. 2012. P. 157-177.
  18. I.V.Kotenko, A.V.Bogovik, Kovalev I.S., etc. The control theory in military systems. I.V.Kotenko (ed.). Moscow, MD, 2001. 312 p. (in Russian).
  19. I.V.Kotenko, M.M.Kotuchov, A.S.Markov, etc. Legislative, legal, organizational and technical support of information security of automated systems and networks. I.V.Kotenko (ed.). SPb., MSU, 2000. 190 p. (in Russian) // https://elibrary.ru/item.asp?id=23269674
  20. I.V.Kotenko, A.V.Bogovik, Kovalev I.S., etc. Foundations of the control theory in military systems. Part 2. A.Y. Runeev and I.V.Kotenko (ed.). SPb., MSU, 2000. 200 p. (in Russian).
  21. I.V.Kotenko, A.V.Bogovik, Kovalev I.S., etc. Foundations of the control theory in military systems. Part 1. A.Y. Runeev and I.V.Kotenko (ed.). SPb., MSU, 2000. 192 p. (in Russian).
  22. I.V.Kotenko. The theory and practice of construction of the systems of information and computing support of communication planning processes on the basis of new information technologies. SPb., MSA, 1998. 404 p. (in Russian).
  23. I.V.Kotenko, G.A.Rybov, I.B.Saenko. Intelligent systems for telecommunication control. N.I.Burenin (ed.). SPb., MSA, 1996. 150 p. (in Russian).
  24. I.V.Kotenko, I.P.Janchenko, A.V.Bogovik. Automation of the telecommunication documents development. A.Y. Runeev (ed.). SPb., MSA, 1995. 150 p. (in Russian).
  25. I.V.Kotenko. Object-oriented programming: Smalltalk/V and Smalltalk/V 286. Application for automation of telecommunication control processes. SPb., MSA, 1995. 294 p. (in Russian).
  26. I.V.Kotenko. Logic programming in Prolog. TURBO and PDC PROLOG. SPb., MSA, 1994. 412 p. (in Russian).
  27. I.V.Kotenko. Methods of reasoning in expert systems under the incomplete and contradictory information. SPb., MSA, 1992. 77 p. (in Russian).
  28. I.V.Kotenko. Diagnostics of telecommunication networks. SPb., MSA, 1992. 219 p. (in Russian).
  29. V.I.Antuhov, I.V.Kotenko. Knowledge bases. SPb., MSA, 1991. 86 p. (in Russian).

Papers

2024

  1. R.O. Kryukov, E.V. Fedorchenko, I.V. Kotenko, E.S. Novikova, V.M. Zima. Security assessment based on attack graphs using nvd and mitre ATT & CK database for heterogeneous infrastructures // Information and Control Systems. 2024. 2 (129). . 39-50. DOI: 10.31799/1684-8853-2024-2-39-50 // https://elibrary.ru/item.asp?id=65679939
  2. Igor Kotenko, Igor Saenko, Oleg Lauta , Nikita Vasilyev, Vladimir Sadovnikov. Attacks and defense methods in machine learning systems: analysis of modern research // Cybersecurity issues. 2024. No. 1 (59). pp. 24-37.DOI: 10.21681/2311-2024-1-24-37 // https://elibrary.ru/item.asp?id=59932750 (in Russian).
  3. I.V. Kotenko. Artificial intelligence for cyber security: a new stage of confrontation in cyberspace // Artificial intelligence and decision-making. 2024. No. 1. pp. 3-19. DOI: 10.14357/20718594240101 // https://elibrary.ru/item.asp?id=64897769 (in Russian).
  4. I.V. Kotenko, H. Dong . Detecting attacks on the Internet of Things based on multitasking learning and hybrid sampling methods // Cybersecurity issues. 2024. No. 2 (60). pp. 10-21. DOI: 10.21681/2311-3456-2024-2-10-21 // https://elibrary.ru/item.asp?id=65314207 (in Russian).
  5. B.A. Kobrinsky, A.N. Averkin, V.V. Gribova, A.P. Yeremeev, M.I. Zabezhailo, I.V. Kotenko, M.A. Mikheenkova, B.V. Palyukh, A.G. Podesovsky, G.V. Rybina, Yu. F. Telnov, E.A. Shalfeeva. XXI National Conference on Artificial Intelligence // Artificial Intelligence and adoption solutions. 2024. No. 1. pp. 129-141. DOI: 10.14357/20718594240111 // https://www.elibrary.ru/item.asp?id=64897785 (in Russian).

2023

  1. Maxim Kolomeets, Vasily Desnitsky, Igor Kotenko, Andrey Chechulin. Graph Visualization: Alternative Models Inspired by Bioinformatics. Sensors, 2023, 23(7), 3747. DOI:10.3390/s23073747 // https://elibrary.ru/item.asp?id=61798233
  2. I. Kotenko, K. Izrailov, M. Buinevich. The Method and Software Tool for Identification of the Machine Code Architecture in Cyberphysical Devices // Journal of Sensor and Actuator Networks. 2023. Vol. 12(1), pp. 11. DOI: 10.3390/jsan12010011. // https://www.elibrary.ru/item.asp?id=60636071
  3. Diana Levshun, Igor Kotenko. A survey on artificial intelligence techniques for security event correlation: models, challenges, and opportunities // Artificial Intelligence Review. 2023. Vol.56, 8, pp. 8547-8590, DOI: 10.1007/s10462-022-10381-4, https://doi.org/10.21203/rs.3.rs-1975426/v1 // https://www.elibrary.ru/item.asp?id=60364090
  4. I. Kotenko, K. Izrailov, M. Buinevich, I. Saenko, R. Shorey. Modeling the Development of Energy Network Software, Taking into Account the Detection and Elimination of Vulnerabilities // Energies. 2023. Vol. 16. Iss. 13. PP. 5111. DOI:10.3390/en16135111
  5. O. Tushkanova, D. Levshun, A. Branitskiy, E. Fedorchenko, E. Novikova, I. Kotenko. Detection of Cyberattacks and Anomalies in Cyber-Physical Systems: Approaches, Data Sources, Evaluation // Algorithms, vol. 16, no. 2, 2023, pp. 85. DOI: 10.3390/a16020085.// https://www.elibrary.ru/item.asp?id=60517408
  6. Kotenko I.V., Saenko I.B. Exploring opportunities to identify abnormal behavior of data center users based on machine learning models // Pattern Recognition and Image Analysis. Advances in Mathematical Theory and Applications. 2023. . 33. 3. . 368-372. DOI: 10.1134/S1054661823030227 // https://www.elibrary.ru/item.asp?id=55186589
  7. Igor Kotenko, Igor Saenko, Alexey Vinogradenko, Nikita Budko. Intelligent state assessment of complex autonomous objects based on wavelet analysis // Engineering Applications of Artificial Intelligence. 2023. 126. pp. 106869. DOI: 10.1016/j.engappai.2023.106869
  8. Igor Kotenko, Igor Saenko, Andrey Privalov, Oleg Lauta. Ensuring SDN Resilience under the Influence of Cyber Attacks: Combining Methods of Topological Transformation of Stochastic Networks, Markov Processes, and Neural Networks // Big Data and Cognitive Computing. 2023. 7(2). pp. 66. DOI: 10.3390/bdcc7020066
  9. Igor Kotenko, Elena Fedorchenko, Evgenia Novikova, Ashish Jha. Cyber Attacker Profiling for Risk Analysis Based on Machine Learning // Sensors. 2023. 23(4). pp. 2028. DOI: 10.3390/s23042028
  10. D.A. Levshun, I.V. Kotenko. Application of Intelligent Methods of Correlation of System Events in Predictive Analysis of Security States of Objects of Critical Infrastructure // Pattern Recognition and Image Analysis. 2023. 33(3). pp. 389-397. DOI: 10.1134/S1054661823030264
  11. Vasily Desnitsky, Diana Levshun, Igor Kotenko. An Approach to Attack Detection on Graph-Based Modeling of States in Critical Infrastructures // 2023 International Russian Automation Conference (RusAutoCon). 2023. DOI: 10.1109/RusAutoCon58002.2023.10272943
  12. Igor Kotenko, Igor Parashchuk. Analysis of Threats to Information Security of Industrial Automation Systems Using Euclidean and Hamming Distances between Fuzzy Sets // 2023 International Russian Automation Conference (RusAutoCon). 2023. DOI: 10.1109/RusAutoCon58002.2023.10272922
  13. Huiyao Dong, Igor Kotenko. An Autoencoder-based Multi-task Learning for Intrusion Detection in IoT Networks // 2023 IEEE Ural-Siberian Conference on Biomedical Engineering, Radioelectronics and Information Technology (USBEREIT). 2023. DOI: 10.1109/USBEREIT58508.2023.10158807
  14. Mhd Raed, Semih Yön, Ali Güneş, Igor Kotenko, Elena Fedorchenko, Anna Polubaryeva. An RFID Based Localization and Mental Stress Recognition System Using Wearable Sensors // Proceedings of the 16th International Joint Conference on Biomedical Engineering Systems and Technologies. 2023. 4. pp. 325-331. DOI: 10.5220/0011796000003414
  15. Igor Kotenko, Igor Saenko. Applying Machine Learning Methods to Detect Abnormal User Behavior in a University Data Center // Intelligent Distributed Computing XV. Studies in Computational Intelligence. 2023. pp. 13-22. DOI: 10.1007/978-3-031-29104-3_2
  16. Diana Gaifulina, Alexander Branitskiy, Dmitry Levshun, Elena Doynikova, Igor Kotenko. Sentiment Analysis of Social Network Posts for Detecting Potentially Destructive Impacts // Intelligent Distributed Computing XV. Studies in Computational Intelligence. 2023. pp. 203-212. DOI: 10.1007/978-3-031-29104-3_23
  17. Igor Kotenko, Igor Saenko, Oleg Lauta, Nikita Vasiliev, Dmitry Iatsenko. Attacks Against Machine Learning Systems: Analysis and GAN-based Approach to Protection // Proceedings of the Seventh International Scientific Conference Intelligent Information Technologies for Industry (IITI23). Lecture Notes in Networks and Systems. 2023. pp. 49-59. DOI: 10.1007/978-3-031-43792-2_5
  18. Diana Levshun, Igor Kotenko. Intelligent Graph-Based Correlation of Security Events in Cyber-Physical Systems // Proceedings of the Seventh International Scientific Conference Intelligent Information Technologies for Industry (IITI23). Lecture Notes in Networks and Systems. 2023. pp. 115-124. DOI: 10.1007/978-3-031-43792-2_12
  19. Huiyao Dong, Igor Kotenko. Train Without Label: A Self-supervised One-Class Classification Approach for IoT Anomaly Detection // Proceedings of the Seventh International Scientific Conference Intelligent Information Technologies for Industry (IITI23). Lecture Notes in Networks and Systems. 2023. pp. 81-89. DOI: 10.1007/978-3-031-43792-2_8
  20. Igor Kotenko, Igor Parashchuk, Vasily Desnitsky. Determination of the Transition Probability Matrix for an IoT Fuzzy Security Model // 2023 IEEE International Conference on Internet of Things and Intelligence Systems (IoTaIS). 2023. pp. 40-44. DOI: 10.1109/IoTaIS60147.2023.10346032
  21. Igor Kotenko, Vasily Desnitsky, Evgenia Novikova. Defect Detection in Industrial IoT-based Machines: Case of Small Training Dataset // 2023 IEEE International Conference on Internet of Things and Intelligence Systems (IoTaIS). 2023. DOI: 10.1109/IoTaIS60147.2023.10346064
  22. Igor Kotenko, Igor Parashchuk. Interval Analysis of Security for Information and Telecommunication Resources of Critical Infrastructures // Society 5.0. Studies in Systems, Decision and Control. 2023. 2023. 437. pp. 241-250. DOI: 10.1007/978-3-031-35875-3_19
  23. Igor Kotenko, Igor Saenko, Fadey Skorik. IoT Network Administration by Intelligent Decision Support Based on Combined Neural Networks // Internet of Things / Security, Trust and Privacy Models, and Architectures in IoT Environments. 2023. pp. 1-24. DOI: 10.1007/978-3-031-21940-5_1
  24. Vasily Desnitsky, Igor Kotenko, Igor Paraschuk, Elena Fedorchenko. Metrics and Indicators of Security of Critical Resources in State and Corporate Objects and Processes // Information Computing and Processing. 2023
  25. I.V. Kotenko, D.A. Levshun. Methods of intelligent system event analysis for multistep cyber-attack detection: using knowledge bases // Artificial intelligence and decision-making. 2023. No. 2. pp. 3-14. DOI: 10.14357/20718594230201 // https://elibrary.ru/item.asp?id=54105805 (in Russian).
  26. I.V. Kotenko, I.B. Saenko, M.H. Al-Barry. Detecting abnormal behaviour of users of data processing centres of higher education institutions // Legal Informatics. 2023. No. 1. pp. 62-71. DOI: 10.21681/1994-1404-2023-1-62-71 // https://www.elibrary.ru/item.asp?id=53761618 (in Russian).
  27. I.B. Saenko, I.V. Kotenko, O.S. Lauta, .Yu. Skorobogatov. Computer attack models on software-configurable networks // High-tech technologies in space research of the Earth. 2023. Vol. 15. No. 1. pp. 37-47.DOI: 10.36724/2409-5419-2023-15-1-37-47 // https://www.elibrary.ru/item.asp?id=50759958 (in Russian).
  28. I.V. Kotenko, I.B. Paraschuk. Adaptive neural network filtering in the interests of operational assessment of the security of critical resources // Mathematical methods in technologies and engineering. 2023. No. 1. pp. 58-61. DOI: 10.52348/2712-8873_MTT_2023_1_58 // https://www.elibrary.ru/item.asp?id=50386136 (in Russian).
  29. I.V. Kotenko, I.B. Saenko, R.I. Zakharchenk, D.V. Velichko. Subsystem for prevention of computer attacks against objects of critical information infrastructure: analysis of functioning and implementation // Cybersecurity issues. 2023. No. 1 (53). pp. 13-27. DOI: 10.21681/2311-3456-2023-1-13-27 // https://elibrary.ru/item.asp?id=50337100 (in Russian).
  30. E.S. Novikova, E.V. Fedorchenko, I.V. Kotenko, I.I. Kholod. Analytical review of intelligent intrusion detection systems based on federated learning: advantages and open challenges // Informatics and Automation. 2023. Vol. 22. No. 5. pp. 1034-1082. DOI: 10.15622/ia.22.5.4 // https://www.elibrary.ru/item.asp?id=54515310 (in Russian).
  31. I.V. Kotenko, D.A. Levshun. Methods of intelligent system event analysis for multistep cyber-attack detection: using machine learning methods // Artificial intelligence and decision-making. 2023. No. 3. pp. 3-15. DOI: 10.14357/20718594230301 // https://elibrary.ru/item.asp?id=54684774 (in Russian).
  32. I.V. Kotenko, E.V. Fedorchenko, E.S. Novikova, I.B. Saenko, A.S Danilov. Data collection methodology for security analysis of industrial cyber-physical systems // Cybersecurity issues. 2023. No. 5 (57). pp. 69-79. DOI: 10.21681/2311-3456-2023-5-69-79 // https://elibrary.ru/item.asp?id=54709889 (in Russian).
  33. E.V. Fedorchenko, I.V. Kotenko, A.V. Fedorchenko, E.S. Novikova, I.B. Saenko. Assessment of information system security based on the exploit's graph model // Questions of cybersecurity. 2023. No. 3 (55). pp. 23-36. DOI: 10.21681/2311-3456-2023-3-23-36 // https://www.elibrary.ru/item.asp?id=54303091 (in Russian).
  34. I.V. Kotenko, I.B. Saenko, R.I. Zakharchenko, A.S. Kapustin, M.H. Al-Barry. Management of access to electronic information and educational environment of universities of federal executive authorities // Issues of cybersecurity. 2023. No. 2 (54). pp. 73-84. DOI: 10.21681/2311-3456-2023-2-73-84 // https://www.elibrary.ru/item.asp?id=54282355 (in Russian).
  35. I.V. Kotenko, I.B. Paraschuk. Specific features of operational assessment of security of critical resources based on adaptive neural network filtering // Bulletin of the Astrakhan State Technical University. Series: Management, Computer Engineering and Computer Science. 2023. No. 3. pp. 55-64. DOI: 10.24143/2072-9502-2023-3-55-64 // https://www.elibrary.ru/item.asp?id=54320879 (in Russian).
  36. E.S. Novikova, I.V. Kotenko, A.V. Meleshko, k.E. Izrailov. federated learning based intrusion detection: system architecture and experiments // Issues of cybersecurity. 2023. No. 6 (58). pp. 50-66. DOI: 10.21681/2311-3456-2023-6-50-66 // https://elibrary.ru/item.asp?id=54966746 (in Russian).
  37. I.V. Kotenko, B.A. Kobrinsky, T.V. Afanasyeva, V.V. Borisov, V.V. Gribova, A.P. Yeremeev, M.A. Mikheenkova, G.V. Rybina, A.A. Kharlamov. The Twentieth National Conference on Artificial Intelligence // Artificial intelligence and decision-making. 2023. No. 2. pp. 108-116. DOI: 10.14357/20718594230209 // https://www.elibrary.ru/item.asp?id=54105813 (in Russian).
  38. I.V. Kotenko, I.A. Popkov. Analysis of current research trends in the topic of THREAT HUNTING // Actual problems of infotelecommunications in science and education (APINO 2023). Collection of scientific articles. XII International Scientific-technical and scientific-methodical Conference. In 4 t .. St. Petersburg, 2023. pp. 683-687. // https://elibrary.ru/item.asp?id=54033669 (in Russian).
  39. I.V. Kotenko, I.A. Popkov. Methodology of automated forensic data collection in THREAT HUNTING processe // Actual problems of infotelecommunications in science and education (APINO 2023). Collection of scientific articles. XII International Scientific-technical and scientific-methodical Conference. In 4 t .. Saint Petersburg, 2023. pp. 679-683 // https://elibrary.ru/item.asp?id=54033668 (in Russian).
  40. I.V. Kotenko, I.B. Paraschuk, I.B. Saenko. The content and features of the key stages of the development of methods and models for processing data on cybersecurity incidents in departmental infocommunication networks // Actual problems of infotelecommunications in science and education (APINO 2023). Collection of scientific articles. XII International Scientific-technical and scientific-methodical Conference. In 4 t .. St. Petersburg, 2023. pp. 674-678. // https://www.elibrary.ru/item.asp?id=54033667 (in Russian).
  41. I.V. Kotenko, D.A.Levshun. Algorithm for cause-and-effect correlation of security events in cyber-physical systems on the basis of intelligent graph-oriented approach // Actual problems of infotelecommunications in science and education (APINO 2023). Collection of scientific articles. XII International Scientific-technical and scientific-methodical Conference. In 4 t .. St. Petersburg, 2023. pp. 669-674. // https://elibrary.ru/item.asp?id=54033666 (in Russian).
  42. E.A. Ichetovkin, I.V. Kotenko. Analysis of attacks on machine learning components of intrusion detection systems // Actual problems of infotelecommunications in science and education (APINO 2023). Collection of scientific articles. XII International Scientific-technical and scientific-methodical Conference. In 4 t .. Saint Petersburg, 2023. pp. 600-604 // https://elibrary.ru/item.asp?id=54033651 (in Russian).
  43. E.A. Ichetovkin, I.V. Kotenko. Analysis of protection methods intrusion detection systems from attacks on machine learning components // Actual problems of infotelecommunications in science and education (APINO 2023). Collection of scientific articles. XII International Scientific-technical and scientific-methodical Conference. In 4 t .. St. Petersburg, 2023. pp. 595-600 // https://elibrary.ru/item.asp?id=54033650 (in Russian).
  44. I.YU. Zelichenok, I.V. Kotenko. Architecture and implementation of the prototype of the module for detecting multi-step attacks using short-term and long-term analysis (APINO 2023). Collection of scientific articles. XII International Scientific-technical and scientific-methodical Conference. In 4 t .. St. Petersburg, 2023. pp. 537-541 // https://elibrary.ru/item.asp?id=54033638 (in Russian).
  45. E.A. Donskov, I.V. Kotenko I.V. Algorithms for detecting and preventing attacks on intelligent transport systems using blockchain distributed register technology // Actual problems of infotelecommunications in science and education (APINO 2023). Collection of scientific articles. XII International Scientific-technical and scientific-methodical Conference. In 4 t .. St. Petersburg, 2023. pp. 418-423 // https://elibrary.ru/item.asp?id=54033612&pff=1 (in Russian).
  46. H. Dong, I.V. Kotenko. Intrusion detection based on multi-task learning with optimization of uncertainty losses // Actual problems of infotelecommunications in science and education (APINO 2023). Collection of scientific articles. XII International Scientific-technical and scientific-methodical Conference. In 4 t .. Saint Petersburg, 2023. pp. 412-417 // https://elibrary.ru/item.asp?id=54033611&pff=1 (in Russian).
  47. D.R. Valeev, I.V. Kotenko. Analysis of approaches to automatic processing of fuzz testing results // Actual problems of infotelecommunications in science and education (APINO 2023). Collection of scientific articles. XII International Scientific-technical and scientific-methodical Conference. In 4 t .. Saint Petersburg, 2023. pp. 219-224 // https://elibrary.ru/item.asp?id=54033569&pff=1 (in Russian).
  48. I.V. Kotenko, I.B. Saenko, O.S. Lauta, N.A. Vasiliev, V.E. Sadovnikov. An approach to detecting attacks on machine learning systems using a generative-adversarial network // In the collection: The Twenty-first National Conference on Artificial Intelligence with International Participation (CII-2023). Proceedings of the conference. In 2 volumes. Smolensk, 2023. pp. 366-376.// https://elibrary.ru/item.asp?id=56574854 (in Russian).
  49. H. Dong, I. Kotenko. Enhancing IoT security through convolutional variational autoencoders and resampling techniques with GAN // XXI National Conference on Artificial Intelligence with International Participation (KII-2023). Proceedings of the conference. 2023. 1. pp. 316-328 // https://www.elibrary.ru/item.asp?id=56574849 (in Russian).
  50. S.S. Khmyrov, I.V. Kotenko. The use of attack indicators for attribution of methods of compromise in the implementation of targeted attacks on critical infrastructure objects // Actual problems of infotelecommunications in science and education (APINO-2023). vol.3, XII International Scientific, technical and scientific-methodological Conference; collection of scientific articles in 4 volumes / Under. ed. S.I. Makarenko; comp. V.S. Elagin, E.A. Anikevich. St. Petersburg: SPbSUT. 2023. 3. pp. 805-809 // https://elibrary.ru/item.asp?id=54609192&selid=54609653 (in Russian).
  51. I.Yu. Zelichenok, I.V. Kotenko. Analysis of big data processing methods used to detect multi-step cyber attacks // In the book: Information Security of Russian regions (IBRR-2023). XIII St. Petersburg Interregional Conference. Conference materials. St. Petersburg, 2023. pp. 82-84.// https://elibrary.ru/item.asp?id=60024738 (in Russian).
  52. E.A. Ichetovkin, I.V. Kotenko. Models of attacks on machine learning components of intrusion detection systems for critical infrastructures // In the book: Information Security of Russian regions (IBRR-2023). XIII St. Petersburg Interregional Conference. Conference materials. St. Petersburg, 2023. pp. 87-88. // https://elibrary.ru/item.asp?id=60024741 (in Russian).
  53. I.A. Popkov, I.V. Kotenko. Digital forensics data gathering for threat hunting purpose // In the book: Information Security of the regions of Russia (IBRD-2023). XIII St. Petersburg Interregional Conference. Conference materials. St. Petersburg, 2023. pp. 103-104.// https://elibrary.ru/item.asp?id=60024753 (in Russian).
  54. I.V. Kotenko, I.B. Saenko, I.B. Paraschuk. Levels of architecture of components of operational assessment of security of information and telecommunication resources of critical infrastructure // In the book: Information security of regions of Russia (IBRR-2023). XIII St. Petersburg Interregional Conference. Conference materials. St. Petersburg, 2023. pp. 88-90.// https://elibrary.ru/item.asp?id=60024742 (in Russian).
  55. E.A. Donskov, I.V. Kotenko. Reputation and trust models for intelligent transport systems based on blockchain // Information security of the regions of Russia (IBRR-2023) XIII-I St. Petersburg Interregional Conference. Materials of the conference, St. Petersburg, SPOISU. 2023. pp. 77-78 //https://elibrary.ru/item.asp?id=60024734&pff=1 (in Russian).
  56. D.R. Valeev, I.V. Kotenko. Limitations and outlook for software runtime patching tools // Information security of the regions of Russia (IBRR-2023) XIII-I St. Petersburg Interregional Conference. Materials of the conference, St. Petersburg, SPOISU. 2023. pp. 69-70 // https://elibrary.ru/item.asp?id=60024727&pff=1 (in Russian).
  57. S.S. Khmyrov, I.V. Kotenko. Approach to forming the featuresof a target cyber attack for atribution of the cyber interrupter // Information security of the regions of Russia (IBRR-2023) XIII-I St. Petersburg Interregional Conference. Materials of the conference, St. Petersburg, SPOISU. 2023. pp. 112-114 // https://elibrary.ru/item.asp?id=60025211&pff=1 (in Russian).
  58. M.V. Melnik, I.V. Kotenko. Detection of abnormal behavior of users and entities in container systems based on machine learning methods // Information security of the regions of Russia (IBRR-2023) XIII-I St. Petersburg Interregional Conference. Materials of the conference, St. Petersburg, SPOISU. 2023. pp. 97-98 // https://elibrary.ru/item.asp?id=60024749&pff=1 (in Russian).

2022

  1. Elena Doynikova, Evgenia Novikova, Ivan Murenin, Maxim Kolomeec, Diana Gaifulina, Olga Tushkanova, Dmitry Levshun, Alexey Meleshko, Igor Kotenko. Security Measuring System for IoT Devices // Lecture Notes in Computer Science. 2022. . 13106 LNCS. . 256-275. DOI: 10.1007/978-3-030-95484-0_16 // https://elibrary.ru/item.asp?id=48184836
  2. Igor Kotenko,Igor Saenko, Oleg Lauta, Michael Karpov, Ksenia Kribel. An approach to modeling of the security system of intelligent transport systems based on the use of flat graphs // Lecture Notes in Networks and Systems (LNNS). - 2022. - Vol. 330 LNNS. - pp. 440-451. DOI: 10.1007/978-3-030-87178-9_44 // https://elibrary.ru/item.asp?id=47026624
  3. Lidia Vitkova, Andrey Chechulin, Igor Kotenko. Feature selection for intelligent detection of targeted influence on public opinion in social networks // Lecture Notes in Networks and Systems. 2022. . 330 LNNS. . 421-430. DOI: 10.1007/978-3-030-87178-9_42 // https://elibrary.ru/item.asp?id=47100014
  4. Evgenia Novikova, Diana Gaifulina, Elena Doynikova, Igor Kotenko. Construction and Analysis of Integral User-Oriented Trustworthiness Metrics // Electronics 2022, 11(2), 234, : 234. DOI: 10.3390/electronics11020234 // https://elibrary.ru/item.asp?id=48142369
  5. Alisa Vorobeva, Guldar Khisaeva, Danil Zakoldaev, Igor Kotenko. Detection of Business Email Compromise Attacks with Writing Style Analysis // Communications in Computer and Information Science. 2022. . 1544. . 248-262. DOI: 10.1007/978-981-16-9576-6_18 // https://elibrary.ru/item.asp?id=48149726
  6. Dmitry Levshun, Andrey Chechulin and Igor Kotenko. A Technique for the Design of Abstract Models of Microcontroller-Based Physical Security Systems // Studies in Computational Intelligence. Springer, Cham. Vol. 1026. P. 397-406. DOI: 10.1007/978-3-030-96627-0_36. // https://elibrary.ru/item.asp?id=48587927
  7. Igor Kotenko, Konstantin Izrailov, Michael Buinevich. Static analysis of information systems for iot cyber security: a survey of machine learning approaches // Sensors. 2022. Vol. 22. 4, : 1335. DOI: 10.3390/s22041335 // https://elibrary.ru/item.asp?id=48149031
  8. Igor Kotenko, Konstantin Izrailov, Michael Buinevich. Analytical modeling for identification of the machine code architecture of cyberphysical devices in smart homes // Sensors. 2022. . 22. 3. Serial number: 1017, DOI: 10.3390/s22031017 // https://elibrary.ru/item.asp?id=48145501
  9. Igor Kotenko,Igor Saenko, Oleg Lauta, A. Kribel. Ensuring the survivability of embedded computer networks based on early detection of cyber attacks by integrating fractal analysis and statistical methods // Microprocessors and Microsystems. 2022. . 90. . 104459. DOI: 10.1016/j.micpro.2022.104459 // https://elibrary.ru/item.asp?id=48145751
  10. M. Kuznetsov, Evgenia Novikova, Igor Kotenko, Elena Doynikova. Privacy policies of iot devices: collection and analysis // Sensors. 2022. . 22. 5, : 1838 DOI: 10.3390/s22051838 // https://elibrary.ru/item.asp?id=48183588
  11. Vasily Desnitsky, Andrey Chechulin, Igor Kotenko. Multi-aspect based approach to attack detection in iot clouds // Sensors. 2022. . 22. 5, : 1831. DOI: 10.3390/s22051831 https://www.elibrary.ru/item.asp?id=48184560
  12. Dmitry Levshun, Andrey Chechulin, Igor Kotenko. Security and privacy analysis of smartphone-based driver monitoring systems from the developers point of view // Sensors. 2022. . 22. 13, P. 5063. DOI: 10.3390/s22135063 // https://elibrary.ru/item.asp?id=49158277
  13. Igor Kotenko, Igor Saenko, Igor Parashchuk, Elena Doynikova. An approach for selecting countermeasures against harmful information based on uncertainty management // Computer Science and Information Systems. 2022. . 19. 1. . 415-433. DOI: 10.2298/CSIS210211057K // https://www.elibrary.ru/item.asp?id=48188266
  14. Igor Kotenko, Vladimir Avramenko, Albert Malikov, Igor Saenko. An approach to the synthesis of a neural network system for diagnosing computer incidents // Studies in Computational Intelligence. 2022. . 1026. . 407-416. DOI: 10.1007/978-3-030-96627-0_37 // https://www.elibrary.ru/item.asp?id=48584416
  15. Roman Kryukov, Elena Doynikova, Igor Kotenko. Security analysis of information systems based on attack sequences generation and testing // Studies in Computational Intelligence. 2022. . 1026. . 427-437. DOI:10.1007/978-3-030-96627-0_39 // https://elibrary.ru/item.asp?id=48590774
  16. Konstantin Izrailov, Dmitry Levshun, Igor Kotenko, Andrey Chechulin. Classification and analysis of vulnerabilities in mobile device infrastructure interfaces // Communications in Computer and Information Science. 2022. . 1544. . 301-319. DOI: 10.1007/978-981-16-9576-6_21 // https://elibrary.ru/item.asp?id=48149713
  17. Igor Kotenko, Diana Gaifulina, I. Zelichenok. Systematic literature review of security event correlation methods // IEEE Access. 2022. . 10. . 43387-43420. DOI: 10.1109/ACCESS.2022.3168976 // https://elibrary.ru/item.asp?id=48581809
  18. Igor Kotenko, Igor Parashchuk. Construction of membership functions for fuzzy management of security information and events // Studies in Systems, Decision and Control. 2022. . 417. . 99-110. DOI: 10.1007/978-3-030-95116-0_8 // https://www.elibrary.ru/item.asp?id=48426113
  19. Igor Kotenko, Igor Saenko, Oleg Lauta, Alexander Kribel. A Proactive Protection of Smart Power Grids against Cyberattacks on Service Data Transfer Protocols by Computational Intelligence Methods // Sensors. 2022. . 22. 19. . 7506. DOI: 10.3390/s22197506 // https://www.elibrary.ru/item.asp?id=56872885
  20. Igor Kotenko, Elena Doynikova, Andrey Fedorchenko, Vasily Desnitsky. Automation of Asset Inventory for Cyber Security: Investigation of Event Correlation-Based Technique // Electronics. 2022. . 11. 15. . 2368. DOI: 10.3390/electronics11152368 // https://elibrary.ru/item.asp?id=56069940
  21. Alexey Meleshko, Vasily Desnitsky, Igor Kotenko. Simulation-based and Graph oriented Approach to Detection of Network Attacks // Conference: 2022 11th Mediterranean Conference on Embedded Computing (MECO), P.436-439. DOI:10.1109/MECO55406.2022.9797159
  22. Vasily Desnitsky, Igor Kotenko, Igor Parashuk. Vector-based dynamic assessment of cyber-security of critical infrastructures // : Proceedings of the 2022 Conference of Russian Young Researchers in Electrical and Electronic Engineering, ElConRus 2022. 2022. . 277-282. DOI: 10.1109/ElConRus54750.2022.9755836 // https://www.elibrary.ru/item.asp?id=48582045
  23. Igor Kotenko, Igor Saenko. Towards resilient and efficient big data storage: evaluating a siem repository based on hdfs // : Proceedings - 30th Euromicro International Conference on Parallel, Distributed and Network-Based Processing, PDP 2022. 30. 2022. . 290-297. DOI: 10.1109/PDP55904.2022.00051 // https://elibrary.ru/item.asp?id=48582684
  24. M. Kuznetsov, Evgenia Novikova, Igor Kotenko. An approach to formal desription of the user notification scenarios in privacy policies // : Proceedings - 30th Euromicro International Conference on Parallel, Distributed and Network-Based Processing, PDP 2022. 30. 2022. . 275-282. DOI: 10.1109/PDP55904.2022.00049 // https://elibrary.ru/item.asp?id=48583376
  25. Igor Kotenko, Igor Parashchuk. Description of Information Security Events of Production and Technological Systems Using Fuzzy Graphs // Conference: 2022 International Russian Automation Conference (RusAutoCon) DOI:10.1109/RusAutoCon54946.2022.9896271
  26. Igor Kotenko, Igor Saenko, Oleg Lauta, Nikita Vasiliev. Attacks Against Artificial Intelligence Systems: Classification, The Threat Model and the Approach to Protection // In book: Proceedings of the Sixth International Scientific Conference Intelligent Information Technologies for Industry (IITI22) (pp.293-302) DOI:10.1007/978-3-031-19620-1_28
  27. Igor Kotenko, Igor Saenko, Andrey Chechulin, Lidia Vitkova, Maxim Kolomeec, Igor Zelichenok, Maxim Melnik, Denis Makrushin, Nikita Petrevich. Detection of Anomalies and Attacks in Container Systems: An Integrated Approach Based on Black and White Lists. Lecture Notes in Networks and Systems, 2022, 566 LNNS, P. 107117. DOI:10.1007/978-3-031-19620-1_11
  28. Sergei Adadurov, Alexandr Glukhov, Igor Kotenko, Igor Saenko. Intelligent information security services // Automation, communications, computer science. 2022. No. 3. pp. 27-30. DOI: 10.34649/AT.2022.3.3.004 // https://elibrary.ru/item.asp?id=48174328 (in Russian).
  29. Ilya Bystrov, Igor Kotenko. Analysis of insider threat detection methods tested on cert dataset // Informatization and Communication. 2022. No. 1. pp. 7-12. DOI: 10.34219/2078-8320-2022-13-1-7-12 // https://elibrary.ru/item.asp?id=48316434 (in Russian).
  30. Igor Kotenko, Igor Saenko I.B., Andrey Chechulin, Dmitry Levshun, Sergei Bosyakov, Victor Kochin. The problem of using mobile robotic devices for perimeter monitoring: research analysis and solution approach // Informatization and Communication. 2022. No. 3. pp. 7-14. DOI: 10.34219/2078-8320-2022-13-3-7-14 // https://elibrary.ru/item.asp?id=49389505 (in Russian).
  31. Anton Chudakov, Konstantin Izrailov, Igor Kotenko I.V. Discussion paper: forecasting the possibilitiesof non-euclidan geometry in information security // Informatization and Communications. 2022. No. 3. pp. 15-21. DOI: 10.34219/2078-8320-2022-13-3-15-21 // https://elibrary.ru/item.asp?id=49389506 (in Russian).
  32. Alexandr Branitsky, Yash Sharma, Igor Kotenko, Elena Fedorchenko, Andrey Krasov, Igor Ushakov. Determination of the mental state of users of the social network reddit based on machine learning methods // Information and control systems. 2022. No. 1 (116). pp. 8-18. DOI: 10.31799/1684-8853-2022-1-8-18 // https://elibrary.ru/item.asp?id=48100847 (in Russian).
  33. Igor Kotenko, Igor Paraschuk. Information and telecommunication resources of critical infrastructures: features of interval security analysis // Bulletin of the Astrakhan State Technical University. Series: Management, Computer Engineering and Computer Science. 2022. No. 2. pp. 33-40. DOI: 10.24143/2073-5529-2022-2-33-40 // https://www.elibrary.ru/item.asp?id=48336486 (in Russian).
  34. Igor Kotenko, Igor Saenko, Mazen Hamed Al-Barry. Application of artificial neural networks to reveal abnormal behavior of data center users // Questions of cybersecurity. 2022. No. 2 (48). pp. 87-97. DOI: 10.21681/2311-3456-2022-2-87-97 // https://elibrary.ru/item.asp?id=48417757 (in Russian).
  35. Igor Kotenko, Semyon Khmyrov. Analysis of models and techniques used for attribution of cyber security violators in the implementation of targeted attacks // Questions of cybersecurity. 2022. No. 4 (50). pp. 52-79. DOI: 10.21681/2311-3456-2022-4-52-79 // https://elibrary.ru/item.asp?id=49326500 (in Russian).
  36. Igor Kotenko, Igor Paraschuk. Interval analysis of the security of telecommunications resources of critical infrastructures // Mathematical methods in technologies and engineering. 2022. No. 1. pp. 64-67. DOI: 10.52348/2712-8873_MMTT_2022_1_64 // https://www.elibrary.ru/item.asp?id=48212144 (in Russian).
  37. K.E. Izrailov, M.V. Buinevich, I.V. Kotenko, V.A. Desnitsky. Assessment and prediction of the complex objects state: application for information security // Issues of cybersecurity. 2022. No. 6 (52). pp. 2-21. DOI: 10.21681/23113456-6-2022-2-21 // https://elibrary.ru/item.asp?id=59158946 // https://elibrary.ru/item.asp?id=50329071 (in Russian).
  38. E.V. Fedorchenko (Doynikova), E.S. Novikova, I.V. Kotenko, D.A. Gayfulina, O.N. Tushkanova, D.S. Levshun, A.V. Meleshko , I.N. Murenin, M.V. Kolomeets. The security and privacy measuring system for the internet of things devices // Cybersecurity issues. 2022. No. 5 (51). pp. 28-46. DOI: 10.21681/2311-3456-2022-5-28-46 // https://elibrary.ru/item.asp?id=50310106 (in Russian).
  39. S. E. Adadurov, I.V. Kotenko, I.B. Saenko. An pproach to big data storage stability and efficiency // Automation, communications, Informatics. 2022. No. 12. pp. 19-21. DOI: 10.34649/AT.2022.12.12.004 // https://www.elibrary.ru/item.asp?id=50139459 (in Russian).
  40. I.V. Kotenko, I.B. Saenko, O.S. Lauta, A.M. Krivel. Anomaly and cyber attack detection technique based on the integration of fractal analysis and machine learning methods // Informatics and Automation. 2022. Vol. 21. No. 6. pp. 1328-1358. DOI: 10.15622/ia.21.6.9 // https://elibrary.ru/item.asp?id=49803813 (in Russian).
  41. I.V. Kotenko, I.B. Saenko, V.P. Kochin. Supercomputing-based cybersecurity event analytical processing system: construction conception // Informatization and Communication. 2022. No. 4. pp. 24-28. DOI: 10.34219/2078-8320-2022-13-4-24-28 // https://elibrary.ru/item.asp?id=49811418 (in Russian).
  42. I. Bystrov, Igor Kotenko. User behaviour model for insider threat detection in information systems of organizations // In the collection: Actual problems of infotelecommunications in science and education (APINO 2022). XI International Scientific-technical and scientific-methodical conference. St. Petersburg, 2022. pp. 225-229 // https://elibrary.ru/item.asp?id=49522688 (in Russian).
  43. Diana Gajfulina, Igor Kotenko. Security event processing models in intelligent systems for monitoring and assessing the security of critical infrastructures // In the collection: Actual problems of infotelecommunications in science and education (APINO 2022). XI International Scientific-technical and scientific-methodical conference. Saint Petersburg, 2022. pp. 319-324. // https://elibrary.ru/item.asp?id=49522708 (in Russian).
  44. Diana Gaifulina, Igor Kotenko, Elena Fedorchenko. Sentiment analysis of social network posts for destructive impacts detection // In the collection: Actual problems of infotelecommunications in science and education (APINO 2022). XI International Scientific-technical and scientific-methodical conference. St. Petersburg, 2022. pp. 324-328. // https://www.elibrary.ru/item.asp?id=49522709 (in Russian).
  45. Evgeniy Donskov, Igor Kotenko. Security analysis of sd-iov-blockchain objects // In the collection: Actual problems of infotelecommunications in science and education (APINO 2022). XI International Scientific-technical and scientific-methodical conference. Saint Petersburg, 2022. pp. 423-428. // https://elibrary.ru/item.asp?id=49522729 (in Russian).
  46. I. Zelichenok, Igor Kotenko. Development of the bench architecture for testing the effectiveness of the multi-step attack detection module // In the collection: Actual problems of infotelecommunications in science and education (APINO 2022). XI International Scientific-technical and scientific-methodical conference. St. Petersburg, 2022. pp. 483-492 // https://elibrary.ru/item.asp?id=49522744 (in Russian).
  47. Igor Kotenko, Vladimir Puchkov. Graph algorithms and platforms graph database management to ensure cybersecurity // In the collection: Actual problems of infotelecommunications in science and education (APINO 2022). XI International Scientific-technical and scientific-methodical conference. Saint Petersburg, 2022. pp. 609-613 // https://elibrary.ru/item.asp?id=49522774&pff=1 (in Russian).
  48. Igor Kotenko, S. Khmyrov. The model of compromising critical information infrastructure objects // In the collection: Actual problems of infotelecommunications in science and education (APINO 2022). XI International Scientific-technical and scientific-methodical conference. St. Petersburg, 2022. pp. 614-619 // https://elibrary.ru/item.asp?id=49522776&pff=1 (in Russian).
  49. I.V. Kotenko, D.A. Levshun. Application of intelligent methods of system event correlation in predictive analytics of security states of critically important infrastructure objects // In the collection: The Twentieth National Conference on Artificial Intelligence with International Participation, CII-2022. Proceedings of the conference. In 2 volumes. Moscow, 2022. pp. 152-167. // https://elibrary.ru/item.asp?id=50296597 (in Russian).
  50. I.V. Kotenko. Artificial intelligence for cybersecurity: confrontation of attack and defense technologies // In the collection: The Twentieth National Conference on Artificial Intelligence with international participation. proceedings of the conference. Moscow, 2022. KII-2022, Moscow, 2022. vol. 1, p. 36. // https://elibrary.ru/item.asp?id=50230020 (in Russian).
  51. I.B. Sayenko, I.V. Kotenko, M.H. Al-Barry. Investigation of the possibilities of detecting abnormal behavior of data center users based on machine learning models // The Twentieth National Conference on Artificial Intelligence with International Participation, CII-2022. Proceedings of the conference. In 2 volumes. Moscow, 2022. pp. 232-241. // https://elibrary.ru/item.asp?id=50178696 (in Russian).
  52. I.V. Kotenko, I.B. Paraschuk, I.B. Saenko. Building a subsystem for operational assessment of the level of cybersecurity of information and telecommunication resources of critical infrastructure based on analytical processing of large arrays of heterogeneous data // Regional Informatics (RI-2022). Jubilee XVIII St. Petersburg International Conference. Conference materials. Saint Petersburg, 2022. pp. 96-97.// https://www.elibrary.ru/item.asp?id=49977142 (in Russian).
  53. D.A. Levshun, I.V. Kotenko. Architecture of the security event correlation system based on data mining // In the book: Regional Informatics (RI-2022). Jubilee XVIII St. Petersburg International Conference. Conference materials. Saint Petersburg, 2022. pp. 171-172. // https://elibrary.ru/item.asp?id=49977211 (in Russian).
  54. I.V. Kotenko, I.B. Saenko. The concept of analytical processing of large arrays of heterogeneous data on cyber security events in critical infrastructure // In the book: Materials of the conference "Information Technologies in Management" (ITU-2022). 15th MULTI-CONFERENCE ON MANAGEMENT ISSUES. Saint Petersburg, 2022. pp. 218-221. // https://elibrary.ru/item.asp?id=50211044 (in Russian).
  55. I.B. Paraschuk, I.V. Kotenko, I.B. Saenko. Development of source data for algorithms for fuzzy management of information and security events in cyber-physical systems // In the collection: Promising directions of development of domestic information technologies. materials of the VIII interregional scientific and practical conference.. Sevastopol State University. Sevastopol, 2022. pp. 47-50. // https://www.elibrary.ru/item.asp?id=54451559 (in Russian).
  56. I.B. Paraschuk, I.V. Kotenko. Operational assessment of the security of information and telecommunications resources based on two-stage processing of uncertain source data // In the book: Materials of the conference "Information Technologies in Management" (ITU-2022). The 15th Multi-Conference on Management Issues. St. Petersburg, 2022. pp. 233-236. // https://www.elibrary.ru/item.asp?id=50211048// https://www.elibrary.ru/item.asp?id=50211048 (in Russian).

2021

  1. Alexander Branitskiy, Igor Kotenko, Igor Saenko. Applying Machine Learning and Parallel Data Processing for Attack Detection in IoT // IEEE Transactions on Emerging Topics in Computing. 2021. . 9. 4. . 1642-1653. https://doi.org/10.1109/TETC.2020.3006351 // https://elibrary.ru/item.asp?id=47507570
  2. Dmitry Levshun, Andrey Chechulin, Igor Kotenko. Design of secure microcontroller-based systems: application to mobile robots for perimeter monitoring // Sensors 2021. Vol. 21, 24. : 8451. DOI: 10.3390/s21248451. https://www.mdpi.com/1424-8220/21/24/8451 // https://elibrary.ru/item.asp?id=47541785 (Scopus, WoS, SJR=0.636, Q1)
  3. Doynikova Elena, Novikova Evgenia, Gaifulina Diana, Kotenko Igor. Towards Attacker Attribution for Risk Analysis // Lecture Notes in Computer Science. 2021. . 12528 LNCS. . 347-353. // DOI:10.1007/978-3-030-68887-5_22 // https://elibrary.ru/item.asp?id=46756437
  4. Igor Saenko, Fadey Scorik, Igor Kotenko. Combined neural network for assessing the state of computer network elements // Studies in Computational Intelligence. 2021. . 925 SCI. . 256-261. DOI: 10.1007/978-3-030-60577-3_30 // https://elibrary.ru/item.asp?id=45247405 (WoS and Scopus)
  5. Vasily Desnitsky, Igor Kotenko. Simulation and Assessment of Battery Depletion Attacks on Unmanned Aerial Vehicles for Crisis Management Infrastructures // Simulation Modelling Practice and Theory. 2021. . 107. . 102244. DOI: 10.1016/j.simpat.2020.102244 // https://elibrary.ru/item.asp?id=45028824
  6. Igor Kotenko, Igor Parashchuk. A variant of the analytical specification of security information and event management system // Studies in Systems, Decision and Control. 2021. . 350. . 321-331. DOI: 10.1007/978-3-030-67892-0_26 // https://elibrary.ru/item.asp?id=46835262
  7. Igor Kotenko, Igor Parashchuk. A Fuzzy Model of the Security Event and Incident Management for Technological Processes and Objects // Lecture Notes in Electrical Engineering. 2021. . 729 LNEE. . 550-559. DOI: 10.1007/978-3-030-71119-1_54 // https://www.elibrary.ru/item.asp?id=46023495
  8. Igor V. Kotenko, Igor B. Parashchuk. Specification of Quality Indicators for Security Event and Incident Management in the Supply Chain // International Journal of Computing 2021, Vol. 20, Issue 1 . 22-30 https://doi.org/10.47839/ijc.20.1.2088 // https://www.elibrary.ru/item.asp?id=46020149 (Scopus)
  9. Maxim Kolomeets, Andrey Chechulin, Igor Kotenko. Bot detection by friends graph in social networks // Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA). Vol.12, 2 2021. pp. 141-159. DOI: 10.22667/JOWUA.2021.06.30.141. URL: http://isyou.info/jowua/papers/jowua-v12n2-6.pdf. (Scopus, Q2) // https://elibrary.ru/item.asp?id=47517731
  10. Michael Buinevich, Konstantin Izrailov, Igor Kotenko, Pavel Kurta. Method and algorithms of visual audit of program interaction // Journal of Internet Services and Information Security. 2021. . 11. 1. . 16-43. DOI: 10.22667/JISIS.2021.02.28.016 // https://elibrary.ru/item.asp?id=46766923
  11. Igor Kotenko, Konstantin Izrailov, Andrey Krasov, Igor Ushakov. An Approach for Stego-Insider Detection Based on a Hybrid NoSQL Database // Journal of Sensor and Actuator Networks. 2021. . 10. 2. Serial number: 25 DOI: 10.3390/jsan10020025 // https://elibrary.ru/item.asp?id=46862821
  12. Igor Kotenko, Igor Saenko, Oleg Lauta, M. Karpov. Methodology for management of the protection system of smart power supply networks in the context of cyberattacks // Energies. 2021. . 14. 18. Serial number: 5963 DOI: 10.3390/en14185963 // https://elibrary.ru/item.asp?id=47097187
  13. Igor Saenko, Igor Kotenko, F. Skorik, M. Al-Barri. Detecting anomalous behavior of users of data centers based on the application of artificial neural networks // Lecture Notes in Computer Science. 2021. . 12948 LNAI. . 331-342. DOI: 10.1007/978-3-030-86855-0_23 // https://www.elibrary.ru/item.asp?id=47513360
  14. H.D. Karatza, Igor Kotenko. Guest editors introduction Modeling and simulation for intelligent distributed computing // Simulation Modelling Practice and Theory. 2021. . 109. . 102297. DOI: 10.1016/j.simpat.2021.102297 // https://elibrary.ru/qqooml
  15. Andrey Privalov, D. Titov, Igor Kotenko, Igor Saenko, Natalya Evglevskaya. Evaluating the functioning quality of data transmission networks in the context of cyberattacks // Energies. 2021. . 14. 16. Serial number: 4755 DOI: 10.3390/en14164755 // https://elibrary.ru/item.asp?id=46939445
  16. Igor Kotenko, Igor Saenko, Oleg Lauta, K. Kribel. LSTM neural networks for detecting anomalies caused by web application cyber attacks // Frontiers in Artificial Intelligence and Applications. 2021. . 337. . 127-140. DOI: 10.3233/FAIA210014 // https://elibrary.ru/item.asp?id=47510004
  17. Lidia Vitkova, Igor Kotenko, Andrey Chechulin. An approach to ranking the sources of information dissemination in social networks // Information (Switzerland). 2021. . 12. 10.Serial number: 416 DOI: 10.3390/info12100416 // https://elibrary.ru/item.asp?id=47516212
  18. Igor Kotenko, Igor Parashchuk. A variant of the analytical specification of security information and event management systems // Studies in Systems, Decision and Control. 2021. . 350. . 321-331. DOI: 10.1007/978-3-030-67892-0_26 // https://www.elibrary.ru/item.asp?id=46835262
  19. Igor Kotenko, Igor Saenko, Alexander Branitskiy, Igor Paraschuk, Diana Gayfullina. Intelligent system of analytical processing of digital network content for protection against inappropriate information // Informatics and automation. 2021. Vol. 20. No. 4. pp. 755-792. DOI: 10.15622/ia.20.4.1 // https://elibrary.ru/item.asp?id=46506070 (in Russian).
  20. Elena Doynikova, Alexander Branitskiy, Igor Kotenko. Detection and Monitoring of the Destructive Impacts in the Social Networks using Machine Learning Methods // Communications in Computer and Information Science. 2021. . 1538. . 60-65. DOI: 10.1007/978-3-030-94209-0_6 // https://elibrary.ru/item.asp?id=48152443
  21. Igor Parashchuk, Igor Kotenko. Target functions of the conceptual model for adaptive monitoring of integrated security in material processing systems // : Materials Today: Proceedings. . "International Conference on Modern Trends in Manufacturing Technologies and Equipment 2020, ICMTMTE 2020" 2021. . 1454-1458. DOI: 10.1016/j.matpr.2020.08.125 // https://www.elibrary.ru/item.asp?id=46761315 (Scopus)
  22. Oleg Lauta, Igor Saenko, Igor Kotenko. Increasing the reliability of computer network protection system by analyzing its controllability models // : Proceedings - 2021 International Russian Automation Conference, RusAutoCon 2021. 2021. . 537-542. DOI: 10.1109/RusAutoCon52004.2021.9537393 // https://elibrary.ru/item.asp?id=47101158
  23. Vasily Desnitsky, Igor Kotenko, Igor Parashchuk. Fuzzy sets in problems of identification of attacks on wireless sensor networks // : Proceedings of the 2021 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering, ElConRus 2021. 2021. . 290-293. DOI: 10.1109/ElConRus51938.2021.9396712 // https://www.elibrary.ru/item.asp?id=46024531
  24. Igor Kotenko, Igor Saenko,Alexander Kribel, Oleg Lauta. A technique for early detection of cyberattacks using the traffic self-similarity property and a statistical approach // : Proceedings - 29th Euromicro International Conference on Parallel, Distributed and Network-Based Processing, PDP 2021. 29. 2021. . 281-284. DOI: 10.1109/PDP52278.2021.00052 // https://elibrary.ru/item.asp?id=46048340
  25. Diana Gaifulina, Igor Kotenko. Selection of deep neural network models for iot anomaly detection experiments // : Proceedings - 29th Euromicro International Conference on Parallel, Distributed and Network-Based Processing, PDP 2021. 29. 2021. . 260-265. DOI: 10.1109/PDP52278.2021.00049 // https://elibrary.ru/item.asp?id=46082400
  26. Alexander Branitskiy, Elena Doynikova, Igor Kotenko. Technique for classifying the social network profiles according to the psychological scales based on machine learning methods //Journal of Physics: Conference Series. 13. . "13th Multiconference on Control Problems, MCCP 2020" 2021. . 012121. DOI: 10.1088/1742-6596/1864/1/012121 // https://elibrary.ru/item.asp?id=46868874
  27. Alexey Meleshko, Vasily Desnitsky, Igor Kotenko, Eugenia Novikova, A. Shulepov. Combined approach to anomaly detection in wireless sensor networks on example of water management system // : 2021 10th Mediterranean Conference on Embedded Computing, MECO 2021. 10. 2021. . 9460237. DOI: 10.1109/MECO52532.2021.9460237 https://www.elibrary.ru/item.asp?id=47060214
  28. Igor Kotenko, Igor Parashchuk. Evaluation of information security of industrial automation systems using fuzzy algorithms and predicates // : Proceedings - 2021 International Russian Automation Conference, RusAutoCon 2021. 2021. . 261-266. DOI: 10.1109/RusAutoCon52004.2021.9537332 // https://www.elibrary.ru/item.asp?id=47066462
  29. Konstantin Izrailov, Michael Buinevich, Igor Kotenko, . Yaroshenko. Identifying characteristics of software vulnerabilities by their textual description using machine learning // : World Automation Congress Proceedings. . "2021 World Automation Congress, WAC 2021" 2021. . 186-192. DOI: 10.23919/WAC50355.2021.9559470 // https://elibrary.ru/item.asp?id=47513415
  30. Y. Sineshchuk, S. Terekhin, Igor Saenko, Igor Kotenko. Evaluation of graphical user interfaces by the search time for information objects // : Journal of Physics: Conference Series. . "International Conference on Automatics and Energy, ICAE 2021" 2021. . 012076. DOI: 10.1088/1742-6596/2096/1/012076 // https://elibrary.ru/item.asp?id=47547124
  31. Igor Kotenko, Igor Parashchuk, and Didier El Baz. Selection and justification of information security indicators for materials processing systems // MATEC Web of Conferences. 2021. 346 (01019). pp. 1-13.DOI: https://doi.org/10.1051/matecconf/202134601019 (WoS, Scopus, , ) https://www.matec-conferences.org/articles/matecconf/pdf/2021/15/matecconf_icmtmte2021_01019.pdf
  32. Alexey Meleshko, Vasily Desnitsky, Igor Kotenko. Approach to Anomaly Detection in Self-Organized Decentralized Wireless Sensor Network for Air Pollution Monitoring // MATEC Web of Conferences. 2021. 346 (03002). pp. 1-8. DOI: 10.1051/matecconf/202134603002 (WoS, Scopus, , )
  33. Igor Kotenko, Yash Sharma, Alexander Branitskiy. Predicting the Mental State of the Social Network Users based on the Latent Dirichlet Allocation and fastText // Proceedings of the 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, IDAACS 2021. pp. 191-195 (WoS, Scopus, , ) DOI:10.1109/IDAACS53288.2021.9661061 // https://elibrary.ru/item.asp?id=48134081
  34. Roman Ushakov, Elena Doynikova, Evgenia Novikova, Igor Kotenko. CPE and CVE based Technique for Software Security Risk Assessment // : Proceedings of the 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, IDAACS 2021. 22-25 September, 2021, Cracow, Poland. pp.353-356 (WoS, Scopus, , ) DOI:10.1109/IDAACS53288.2021.9660968 // https://elibrary.ru/item.asp?id=48134070
  35. I.Murenin, E. Doynikova, I.Kotenko. Towards security decision support for large-scale heterogeneous distributed information systems // Proceedings - 2021 14th International Conference on Security of Information and Networks, SIN 2021. 14. 2021. DOI: 10.1109/SIN54109.2021.9699195 // https://www.elibrary.ru/item.asp?id=48945334
  36. I. Kotenko, I. Saenko, O. Lauta, M. Karpov. Situational control of a computer network security system in conditions of cyber attacks // Proceedings - 2021 14th International Conference on Security of Information and Networks, SIN 2021. 14. 2021.DOI: 10.1109/SIN54109.2021.9699368 // https://www.elibrary.ru/item.asp?id=48933030
  37. Igor Kotenko, Maxim Kolomeec, Ksenia Zhernove, Andrey Chechulin. Visual analytics for information security: areas of application, tasks, visualization models // Cybersecurity issues. 4(44). 2021. pp. 2-15. URL: http://dx.doi.org/10.21681/2311-3456-2021-4-2-15 // https://elibrary.ru/item.asp?id=46331128 (in Russian).
  38. Igor Kotenko, Maxim Kolomeec, Ksenia Zhernove, Andrey Chechulin. Visual analytics for information security: efficiency assessment and analysis of visualization methods // Cybersecurity issues. 6(46). 2021. pp. 36-46. DOI: 10.21681/2311-3456-2021-6-36-45 // https://elibrary.ru/item.asp?id=47327011 (in Russian).
  39. Elena Doynikova, Andrey Fedorchenko, Igor Kotenko, Eugenia Novikova. Security assessment methodology based on the semantic model of metrics and data // Questions of cybersecurity. 2021. No. 1 (41). pp. 29-40. DOI: 10.21681/2311-3456-2021-1-29-40. // https://elibrary.ru/item.asp?id=44833771 (in Russian).
  40. Igor Kotenko., Igor Saenko, Oleg Lauta, Alexander Krivel. The method of early detection of cyber attacks based on integration of fractal analysis and statistical methods // First Mile. 2021. No. 6 (98). pp. 64-71. DOI: 10.22184/2070-8963.2021.98.6.64.70 // https://elibrary.ru/item.asp?id=46613709 (in Russian).
  41. Sergei Adadurov, Igor Kotenko, Alexander Glukhov, Igor Saenko. Intelligent information security control system // Automation, communications, informatics. 2021. No. 12. pp. 14-18. DOI: 10.34649/AT.2021.12.12.004 // https://elibrary.ru/item.asp?id=47294953 (in Russian).
  42. Igor Kotenko, Igor Saenko, Artem Makukha, Michael Biryukov. Options for creating data storages in a common information space taking into account information security // Informatization and Communications. 2021. No. 7. pp. 48-55. DOI: 10.34219/2078-8320-2021-12-7-48-55 // https://elibrary.ru/item.asp?id=47378758 (in Russian).
  43. Igor Kotenko, Igor Paraschuk. Fuzzy management of information and security events: features of constructing membership functions // Vestnik of the Astrakhan State Technical University. Series: Management, Computer Engineering and Computer Science. 2021. No. 3. pp. 7-15. DOI: 10.24143/2072-9502-2021-3-7-15 // https://www.elibrary.ru/item.asp?id=46351797 (in Russian).
  44. Elena Fedorchenko, Eugenia Novikova, Diana Gayfullina, Igor Kotenko. Attacker profiling based on the network traffic analysis // Control systems, communications and security. 2021. No. 6. pp. 76-89. DOI: 10.24412/2410-9916-2021-6-76-89 // https://elibrary.ru/item.asp?id=47416445 (in Russian).
  45. I.V. Kotenko, I.B. Paraschuk. Construction of membership functions in fuzzy security information and event management tasks // Mathematical methods in technology and engineering. 2021. No. 1. pp. 126-129. Proceedings of the International Scientific Conference MMTT-34. DOI: 10.52348/2712-8873_MMTT_2021_1_126 // https://www.elibrary.ru/item.asp?id=45537416 (in Russian).
  46. Vladimir Puchkov, Igor Kotenko. Analysis of the security of cyber-physical systems using attack graphs // XII St. Petersburg Interregional Conference "Information Security of Russian Regions" (IBRR-2021). pp. 98-100 // https://elibrary.ru/item.asp?id=49265507 (in Russian).
  47. Alexander Branitskiy, Igor Kotenko, Elena Fedorchenko. Methods of classifying communities in social networks using neural networks // Actual problems of infotelecommunications in science and education (APINO 2021). collection of scientific articles: in 4 t .. St. Petersburg State University of Telecommunications named after Prof. M.A. Bonch-Bruevich. Saint Petersburg, 2021. pp. 100-103. // https://elibrary.ru/item.asp?id=46275372 (in Russian).
  48. Nina Voncharova, Andrey Bogatyrev, Natalya Krasilnikova, Artem Tishkov, Igor Kotenko. Pedagogical component in the formation of a doctor's personality in medical professional education // In the collection: Social and professional formation of personality in the era of great challenges: Interdisciplinary discourse. collection of articles of the All-Russian conference with international participation. Yaroslavl, 2021. pp. 269-274. // https://elibrary.ru/item.asp?id=45830948 (in Russian).
  49. I.S Bystrov, Igor Kotenko. Analysis of user behavior models for malicious insiders detection // In the collection: Actual problems of infotelecommunications in science and education (APINO 2021). collection of scientific articles: in 4 t .. St. Petersburg State University of Telecommunications named after Prof. M.A. Bonch-Bruevich. Saint Petersburg, 2021. pp. 139-143. // https://elibrary.ru/item.asp?id=46275380 (in Russian).
  50. Diana Gaifulina, Igor Kotenko. Analysis of criteria for the classification of approaches to security events correlation // In the collection: Actual problems of infotelecommunications in science and education (APINO 2021). collection of scientific articles: in 4 t .. St. Petersburg State University of Telecommunications named after Prof. M.A. Bonch-Bruevich. Saint Petersburg, 2021. pp. 206-210. // https://elibrary.ru/item.asp?id=46275393 (in Russian).
  51. E.A. Donskov, Igor Kotenko. Analysis of adversarial attacks on machine learning components of intrusion detection systems // In the collection: Actual problems of infotelecommunications in science and education (APINO 2021). collection of scientific articles: in 4 t .. St. Petersburg State University of Telecommunications named after Prof. M.A. Bonch-Bruevich. St. Petersburg, 2021. pp. 315-319. // https://elibrary.ru/item.asp?id=46275417 (in Russian).
  52. Igor Zelichenok, Igor Kotenko. Analysis of methods for multi-step attack detection // In the collection: Actual problems of infotelecommunications in science and education (APINO 2021). collection of scientific articles: in 4 t .. St. Petersburg State University of Telecommunications named after Prof. M.A. Bonch-Bruevich. St. Petersburg, 2021. pp. 400-405. // https://elibrary.ru/item.asp?id=46275435 (in Russian).
  53. Igor Kotenko, Vladimir Puchkov. Analysis of methods for assessing the security of cyber-physical systems // In the collection: Actual problems of infotelecommunications in science and education (APINO 2021). collection of scientific articles: in 4 t .. St. Petersburg State University of Telecommunications named after Prof. M.A. Bonch-Bruevich. St. Petersburg, 2021. Vol.1 pp. 531-536. // https://elibrary.ru/item.asp?id=46275461 (in Russian).
  54. Igor Kotenko, S. Khmyrov. Analysis of current methods of attributing cyber security offensers in the implementation of targeted attacks on objects of critical infrastructure // In the collection: Actual problems of infotelecommunications in science and education (APINO 2021). collection of scientific articles: in 4 t .. St. Petersburg State University of Telecommunications named after Prof. M.A. Bonch-Bruevich. St. Petersburg, 2021. pp. 536-541. // https://elibrary.ru/item.asp?id=46275462 (in Russian).
  55. Alexander Branitsky, Elena Doynikova, Igor Kotenko. Application of neural networks to detect potentially destructive information content in social networks // In the collection: Pedagogy and psychology in medicine: problems, innovations, achievements. proceedings of the I International Scientific Congress. Moscow, 2021. pp. 35-40. // https://www.elibrary.ru/item.asp?id=47190313 (in Russian).
  56. I.S. Bystrov, I.V. Kotenko. Classification of approaches for user behavior modeling for insider threats detection // XII St. Petersburg Interregional Conference "Information Security of Russian regions" (IBRR-2021). 2021. T 1. pp. 70-72 http://www.spoisu.ru/files/ibrr/ibrr2021/ibrr2021_materials.pdf // https://elibrary.ru/item.asp?id=49240932 (in Russian).
  57. A.V. Pomogalova, E.A. Donskov, I.V. Kotenko. Decentralized finance services: general attack algorithm // XII St. Petersburg Interregional Conference "Information Security of Russian Regions" (IBRR-2021). 2021. T 1. pp. 95-97 http://www.spoisu.ru/files/ibrr/ibrr2021/ibrr2021_materials.pdf // https://elibrary.ru/item.asp?id=49265247 (in Russian).
  58. S.S. Khmyrov, I.V. Kotenko. Analysis of the extended Cyber kill chain model for attributing cyber security offenders under implementation of targeted attacks against critical infrastructure objects // XII St. Petersburg Interregional Conference "Information Security of Russian Regions" (IBRR-2021). 2021. pp. 103-105 http://www.spoisu.ru/files/ibrr/ibrr2021/ibrr2021_materials.pdf // https://elibrary.ru/vpllhz (in Russian).
  59. E.V. Fedorchenko, E.S. Novikova, D.A. Gayfulina, I.V. Kotenko. Attacker profiling for security analysis and response to cyber incidents // In the collection: Actual problems of protection and security: Proceedings of the XXIV All-Russian Scientific and Practical Conference RARAN (March 31 - April 3, 2021). 2021. Volume 1. pp. 144-148 // https://www.elibrary.ru/item.asp?id=48010763 (in Russian).
  60. I.B. Paraschuk, I.V. Kotenko, I.B. Saenko. Management of information and security events based on fuzzy algorithms // Promising directions of development of domestic information technologies: materials of the VII interregional scientific and practical conference. Sevastopol. 2021. pp. 67-68 // https://elibrary.ru/item.asp?id=48803654 (in Russian).
  61. Igor Kotenko, Igor Saenko, Igor Paraschuk. Analysis of the security of critical infrastructure resources in terms of their availability: indicators and criteria // XII St. Petersburg Interregional Conference "Information Security of Russian Regions" (IBRR-2021)1, pp. 87-88 http://www.spoisu.ru/files/ibrr/ibrr2021/ibrr2021_materials.pdf // https://www.elibrary.ru/item.asp?id=49265526 (in Russian).
  62. I.V. Kotenko, I.B. Saenko, I.B. Paraschuk. Criteria for assessing the availability of information, telecommunications and other critical resources for the analysis of their security // Regional informatics and information security. Proceedings of the XII St. Petersburg Interregional Conference. Saint Petersburg, 2021. pp. 97-101. // https://elibrary.ru/item.asp?id=48126257 (in Russian).

2020

  1. Bilal Fakih, Didier El Baz, Igor Kotenko. GRIDHPC: A decentralized environment for high performance computing // Concurrency Computation Practice and Experience. 2020. . 32. 10. . e5320. DOI: 10.1002/cpe.5320, Internal Article ID: 16450736 // https://elibrary.ru/item.asp?id=43203879 (, WoS, Scopus, SJR=0.31, Q2)
  2. Dmitry Levshun, Yannick Chevalier, Igor Kotenko, Andrey Chechulin. Design and verification of a mobile robot based on the integrated model of cyber-physical systems // Simulation Modelling Practice and Theory, 2020, Vol. 105, P. 102151. DOI: 10.1016/j.simpat.2020.102151 // https://elibrary.ru/item.asp?id=45422773
  3. Yannick Chevalier, Roland Rieke, Florian Fenzl, Andrey Chechulin, Igor Kotenko. ECU-Secure: Characteristic Functions for In-Vehicle Intrusion Detection // Studies in Computational Intelligence, Vol.868, 2020. P.495-504. DOI: 10.1007/978-3-030-32258-8_58. // https://elibrary.ru/item.asp?id=43205154
  4. Dmitry Levshun, Igor Kotenko, Andrey Chechulin. The Integrated Model of Secure Cyber-Physical Systems for their Design and Verification // Studies in Computational Intelligence. 2020. . 868. . 333-343. DOI: 10.1007/978-3-030-32258-8_39 // https://elibrary.ru/item.asp?id=43207770
  5. Vasily Desnitsky, Nikolay Rudavin, Igor Kotenko. Modeling and Evaluation of Battery Depletion Attacks on Unmanned Aerial Vehicles in Crisis Management Systems // Studies in Computational Intelligence Vol. 868 . 323-332 DOI:10.1007/978-3-030-32258-8_38 // https://elibrary.ru/item.asp?id=43212577
  6. I. Kotenko, I. Parashchuk. Determining the parameters of the mathematical model of the process of searching for harmful information // Studies in Systems, Decision and Control. Vol. 260, pp. 225-236. DOI: 10.1007/978-3-030-32648-7_18 // https:// https://elibrary.ru/item.asp?id=41817686 (WoS, Scopus)
  7. A. Branitskiy, E. Doynikova, I. Kotenko, N. Krasilnikova, D. Levshun, A. Tishkov, N. Vanchakova. The Common Approach to Determination of the Destructive Information Impacts and Negative Personal Tendencies of Young Generation Using the Neural Network Methods for the Internet Content Processing // Studies in Computational Intelligence. 2020. Vol. 868 P. 302-310. DOI: 10.1007/978-3-030-32258-8_36. // https://elibrary.ru/item.asp?id=43208120
  8. Kotenko I., Saenko I., Levshun D. A model checking based approach for verification of attribute-based access control policies in cloud infrastructures // Advances in Intelligent Systems and Computing. 2020. . 1156. . 165-175. DOI: 10.1007/978-3-030-50097-9_17 // https://elibrary.ru/item.asp?id=45438125 (Scopus)
  9. Dmitry Levshun, Diana Gaifulina, Andrey Chechulin and Igor Kotenko. Problematic Issues of Information Security of Cyber-Physical Systems // Informatics and Automation. Vol. 19. No. 5. 2020. P. 1050-1088. ISSN 2078-9181 (2078-9599). DOI: 10.15622/ia.2020.19.5.6. // https://elibrary.ru/item.asp?id=44269284 (in Russian).
  10. Ksenia Zhernova, Maxim Kolomeets, Igor Kotenko, Andrey Chechulin. Adaptive Touch Interface: Application for Mobile Internet Security // Communications in Computer and Information Science (. ). Springer, Singapore, 2020. Vol. 1121. P. 5372. DOI: 10.1007/978-981-15-9609-4_5 // https://elibrary.ru/item.asp?id=45172903
  11. Dmitry Levshun, Yurii Bakhtin, Andrey Chechulin, Igor Kotenko. Analysis of Attack Actions on the Railway Infrastructure based on the Integrated Model // Communications in Computer and Information Science. Springer, Singapore, 2020. Vol. 1121. P. 145-162. DOI: 10.1007/978-981-15-9609-4_11 // https://elibrary.ru/item.asp?id=45173086
  12. Dmitry Levshun, Igor Kotenko, Andrey Chechulin. The application of the methodology for secure cyberphysical systems design to improve the semi-natural model of the railway infrastructure // Microprocessors and Microsystems. 2020. . 103482. DOI: 10.1016/j.micpro.2020.103482 // https://elibrary.ru/item.asp?id=45110890 (, Scopus)
  13. Gustavo Gonzalez-Granadillo, Elena Doynikova, Joaquin Garcia-Alfaro, Igor Kotenko, Andrey Fedorchenko. Stateful RORI-based countermeasure selection using hypergraphs // Journal of Information Security and Applications. 2020. vol. 54. . 102562. DOI: 10.1016/j.jisa.2020.102562 // https://elibrary.ru/item.asp?id=43306456
  14. Florian Fenzl, Roland Rieke, Yannick Chevalier, Andreas Dominik, Igor Kotenko. Continuous Fields: Enhanced In-Vehicle Anomaly Detection using Machine Learning Models // Simulation Modelling Practice and Theory. 2020. vol. 105. . 102143. DOI: 10.1016/j.simpat.2020.102143 // https://www.elibrary.ru/item.asp?id=45492807
  15. Igor Kotenko, Andrey Fedorchenko, Elena Doynikova. Data Analytics for Security Management of Complex Heterogeneous Systems: Event Correlation and Security Assessment Tasks // EAI/Springer Innovations in Communication and Computing. 2020. . 3. . 79-116. DOI: 10.1007/978-3-030-19353-9_5 // https://elibrary.ru/item.asp?id=45370984
  16. Igor Kotenko, Igor Saenko, Alexander Branitskiy. Machine Learning and Big Data Processing for Cybersecurity Data Analysis // Intelligent systems reference library 2020. Vol. 177. pp. 61-85. DOI: 10.1007/978-3-030-38788-4_4 // https://elibrary.ru/item.asp?id=43247607 (WoS, Scopus)
  17. Igor Kotenko, Igor Saenko, Oleg Lauta, Aleksander Kribel. An Approach to Detecting Cyber Attacks against Smart Power Grids Based on the Analysis of Network Traffic Self-Similarity // 2020 Energies Vol. 13, 19, P. 5031 DOI: 10.3390/en13195031 // https://elibrary.ru/item.asp?id=45234731 (WoS, Scopus)
  18. Igor Kotenko, Lidiya Vitkova, Igor Saenko, Olga Tushkanova, Alexander Branitskiy. The intelligent system for detection and counteraction of malicious and inappropriate information on the Internet // AI Communications. 2020. Vol. 33 . 1. pp. 13-25. DOI: 10.3233/AIC-200647 // https://elibrary.ru/item.asp?id=45174880 (WoS, Scopus)
  19. Evgenia Novikova, Igor Kotenko, Ivan Murenin. The visual analytics approach for analyzing trajectories of critical infrastructure employers // Energies. 2020. vol. 13. 15. pp. 3936. DOI: 10.3390/en13153936 (WoS, Scopus) https://www.mdpi.com/1996-1073/13/15/3936 // https://elibrary.ru/item.asp?id=45330905
  20. Andrey Privalov, Vera Lukicheva, Igor Kotenko, Igor Saenko. Increasing the Sensitivity of the Method of Early Detection of Cyber-Attacks in Telecommunication Networks Based on Traffic Analysis by Extreme Filtering // Energies. 2020. vol. 13 11. pp. 2774. file:///C:/Users/Admin/Downloads/energies-13-02774.pdf. DOI: 10.3390/en13112774 // https://elibrary.ru/item.asp?id=43291532 (WoS, Scopus)
  21. Elena Doynikova, Evgenia Novikova, Igor Kotenko. Attacker Behaviour Forecasting Using Methods of Intelligent Data Analysis: A Comparative Review and Prospects // Information (Switzerland). 2020. . 11. 3. . 168. DOI: 10.3390/INFO11030168 // https://elibrary.ru/item.asp?id=43306145
  22. Igor Kotenko. Guest Editorial: Intelligent Distributed Computing // Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications. 2020. vol. 11. issue 2. pp. 1-2. DOI: 10.22667/JOWUA.2020.06.30.001 // https://www.elibrary.ru/item.asp?id=45443699
  23. Elena Doynikova, Andrey Fedorchenko, Igor Kotenko. A Semantic Model for Security Evaluation of Information Systems // Journal of Cyber Security and Mobility. 2020. vol. 9, . 2. pp. 301330. DOI: 10.13052/JCSM2245-1439.925 // https://elibrary.ru/item.asp?id=43302003
  24. Evgenia Novikova, Mikhail Bestuzhev, Igor Kotenko. Anomaly Detection in the HVAC System Operation by a RadViz Based Visualization-Driven Approach // Lecture Notes in Computer Science. 2020. Vol 11980 LNCS, pp. 402-418. DOI: 10.1007/978-3-030-42048-2_26 // https://elibrary.ru/item.asp?id=43253565
  25. Evgenia Novikova, Elena Doynikova, Igor Kotenko. P2Onto: Making Privacy Policies Transparent // Lecture Notes in Computer Science. 2020. . 12501 LNCS. . 235-252. DOI: 10.1007/978-3-030-64330-0_15 // https://elibrary.ru/item.asp?id=45049659
  26. I. Merelli, P. Lio, I. Kotenko, D. D'Agostino. Latest advances in parallel, distributed, and network-based processing // Concurrency Computation Practice and Experience, 2020.Vol. 32. 10. P. e5683-e5687. DOI: 10.1002/cpe.5683. https://www.onlinelibrary.wiley.com/doi/pdfdirect/10.1002/cpe.5683 // https://elibrary.ru/item.asp?id=43248749
  27. Vyacheslav Efimov, Igor Kotenko, Igor Saenko. Network application-layer protocol classification based on fuzzy data and neural network processing // International Journal of Computing 2020, Vol. 19, Issue 3 . 335 346 https://doi.org/10.47839/ijc.19.3.1877 (Scopus) https://www.computingonline.net/computing/article/view/1877/924 // https://elibrary.ru/item.asp?id=46763664
  28. Lidia Vitkova, Igor Kotenko, Maxim Kolomeets, Olga Tushkanova, Andrey Chechulin. Hybrid Approach for Bots Detection in Social Networks Based on Topological, Textual and Statistical Features // Advances in Intelligent Systems and Computing, Springer. 2020. vol.1156 AISC . P.412-421 (WoS, Scopus). DOI:10.1007/978-3-030-50097-9_42 // https://elibrary.ru/item.asp?id=45439091
  29. Alexey Meleshko, Vasily Desnitsky, Igor Kotenko. Machine learning based approach to detection of anomalous data from sensors in cyber-physical water supply systems // : IOP Conference Series: Materials Science and Engineering. International Conference on Modern Trends in Manufacturing Technologies and Equipment 2019, ICMTME 2019. 2020. . 033034. DOI: 10.1088/1757-899X/709/3/033034 // https://elibrary.ru/item.asp?id=43236220
  30. Vasily Desnitsky, Igor Kotenko, Igor Parashchuk. Neural Network Based Classification of Attacks on Wireless Sensor Networks // Proceeding of the 2020 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus 2020) St. Petersburg and Moscow, Russia, 2730 2020 . P. 284-287 DOI: 10.1109/EIConRus49466.2020.9039275. // https://www.elibrary.ru/item.asp?id=43259386
  31. Maxim Kolomeets, Andrey Chechulin, Ksenia Zhernova, Igor Kotenko, Diana Gaifulina. Augmented reality for visualizing security data for cybernetic and cyberphysical systems // Proceedings-2020 28th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP), March 11-13, 2020, Vasteras, Sweden. P. 421-428. DOI: 10.1109/PDP50117.2020.00071 // https://elibrary.ru/item.asp?id=43284316
  32. Vasily Desnitsky, Igor Kotenko. Enhancing technology of producing secure IoT devices on the base of remote attestation // MATEC Web of Conferences, ICMTMTE 2020, Vol. 329, Article Number 03023. P. 1-8. 2020. DOI: 10.1051/matecconf/202032903023 (WoS) https://www.matec-conferences.org/articles/matecconf/pdf/2020/25/matecconf_icmtmte2020_03023.pdf
  33. Aleksander Kribel; Igor Saenko; Igor Kotenko. Detection of Anomalies in the Traffic of Information and Telecommunication Networks Based on the Assessment of its Self-Similarity // Proceedings - 2020 International Russian Automation Conference (RusAutoCon-2020). Sochi, Russian Federation, September 6-12, 2020. pp. 713-718. DOI: 10.1109/RusAutoCon49822.2020.9208147. // https://www.elibrary.ru/item.asp?id=45197978
  34. Kotenko Igor, Branitskiy Alexander, Tishkov Artem, Doynikova Elena. Analysis of Formats of Young Peoples Communicative Behavior in Social Network //2020 24th International Conference on System Theory, Control and Computing, ICSTCC 2020 - Proceedings. 24. 2020. . 439-444. DOI:10.1109/ICSTCC50638.2020.9259747 // https://elibrary.ru/item.asp?id=45065233
  35. Igor Kotenko, Yury Sineshchuk, Igor Saenko. Optimizing Secure Information Interaction in Distributed Computing Systems by the Sequential Concessions Method // Proceedings - 2020 28th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP) Vasteras, 11-13 March 2020. pp. 429-432. DOI: 10.1109/PDP50117.2020.00072 // https://elibrary.ru/item.asp?id=43305074 (Scopus ( )
  36. Vladimir Avramenko, Igor Kotenko, A. Malikov, Igor Saenko. Combined neural network model for diagnosing computer incidents // CEUR Workshop Proceedings. . "RAAI 2020 - Selected Contributions of the "Russian Advances in Artificial Intelligence" Track at RCAI 2020, co-located with 18th Russian Conference on Artificial Intelligence, RCAI 2020" 2020. . 280-294. http://ceur-ws.org/Vol-2648/paper24.pdf // https://elibrary.ru/item.asp?id=45269276 (Scopus)
  37. Igor Parashchuk, Elena Doynikova, Igor Saenko, Igor Kotenko. Selection of Countermeasures against Harmful Information based on the Assessment of Semantic Content of Information Objects in the Conditions of Uncertainty // INISTA 2020 - 2020 International Conference on INnovations in Intelligent SysTems and Applications, Proceedings. 2020. . 9194680. DOI: 10.1109/INISTA49547.2020.9194680 // https://elibrary.ru/item.asp?id=45285751
  38. Andrei Privalov, Ekaterina Skudneva, Igor Kotenko, Igor Saenko. Graph-based evaluation of probability of disclosing the network structure by targeted attacks // Proceedings of IEEE/IFIP Network Operations and Management Symposium 2020, NOMS 2020 Budapest, 2020 April 20-24 P. 9110299 DOI: 10.1109/NOMS47738.2020.9110299 // https://elibrary.ru/item.asp?id=43306131 (Scopus)
  39. Kolomeets Maxim, Levshun Dmitry, Soloviev Sergei, Chechulin Andrey, Kotenko Igor. Social networks bot detection using Benfords law // : 13th International conference on Security of Information and Networks, SIN 2020. Proceedings of the 13th International Conference on Security of Information and Networks. Virtual, Online, 2020. . 3433589. DOI: 10.1145/3433174.3433589 // https://elibrary.ru/item.asp?id=46743261
  40. Kotenko Igor, Saenko Igor, Skorik Fadey. Intelligent support for network administrator decisions based on combined neural networks // : 13th International Conference on Security of Information and Networks, SIN 2020. Proceedings of the 13th International Conference on Security of Information and Networks. Virtual, Online, 2020. . 3433602. DOI:10.1145/3433174.3433602 // https://elibrary.ru/item.asp?id=46750503 (WoS and Scopus).
  41. Kotenko Igor, Krasov Andrey, Ushakov Igor and Izrailov Konstantin. Detection of Stego-Insiders in Corporate Networks Based on a Hybrid NoSQL Database Model // ACM International Conference Proceeding Series. 4. . "Proceedings of the 4th International Conference on Future Networks and Distributed Systems, ICFNDS 2020" 2020. . 3442612. DOI: 10.1145/3440749.3442612 // https://elibrary.ru/item.asp?id=46072420
  42. Mikhail Buinevich, Konstantin Izrailov, Igor Kotenko, Igor Ushakov, Dmitry Vlasov. Approach to combining different methods for detecting insiders // ACM International Conference Proceeding Series - The 4th International Conference on Future Networks and Distributed Systems (ICFNDS 2020). St.-Petersburg, Russia. November 26 - 27, 2020 . www.icfnds.org. P. 3442619. DOI: 10.1145/3440749.3442619 // https://elibrary.ru/item.asp?id=46092483
  43. L. A. Vitkova, I. B. Saenko, A. A. Chechulin, I. B. Paraschuk The technology of Intelligent analytical processing of digital network objects for detection and counteraction of unappropriate information // The 1st International Conference on Computer Technology Innovations dedicated to the 100th anniversary of the Gorky House of Scientists of Russian Academy of Science (ICCTI 2020). Saint Petersburg, Russia. April 13-14. 2020. P. 13-19 (Scopus) https://iccti.kp.center/wp-content/uploads/2020/12/ICCTI2020-OCP-press.pdf
  44. Doynikova E., Kotenko I., Parashchuk I. An alternative of classification for network traffic monitoring procedures in order to detect harmful information and computer attacks // The 1st International Conference on Computer Technology Innovations dedicated to the 100th anniversary of the Gorky House of Scientists of Russian Academy of Science (ICCTI 2020). Saint Petersburg, Russia. April 13-14. SPb.: Petropolis. 144 p. P.8-12. ISBN: 978-5-9676-1216-9. (Scopus) https://iccti.kp.center/wp-content/uploads/2020/12/ICCTI2020-OCP-press.pdf
  45. Kotenko Igor, Parashchuk Igor. Assessment of components to ensure the security of control and diagnostic information about technological processes // International Conference on Modern Trends in Manufacturing Technologies and Equipment: Mechanical Engineering and Materials Science (ICMTMTE 2020) Sevastopol, Russia. 7-11 September, 2020. MATEC Web of Conferences. vol. 329. no. 03005. pp. 1-10. DOI: 10.1051/matecconf/202032903005. (WoS).
  46. Elena Doynikova, Andrey Fedorchenko, Igor Kotenko. Determination of features of cyber attack goals based on analysis of data in open security data sources // IOP Conference Series: Materials Science and Engineering. Krasnoyarsk Science and Technology City Hall of the Russian Union of Scientific and Engineering Associations. 2020. . 12160. DOI: 10.1088/1757-899X/734/1/012160 // https://www.elibrary.ru/item.asp?id=42766659
  47. Igor Kotenko, Igor Parashchuk. Identification of the traffic model parameters for network and cloud platform security management // 3RD International Scientific and Technical Conference "Modern Network Technologies 2020" (MoNeTeC 2020) Moscow, 2729 October 2020 . . 9258159 DOI:10.1109/MoNeTeC49726.2020.9258159 //https://www.elibrary.ru/item.asp?id=45071307 ()
  48. A.V. Meleshko, V.A. Desnitsky, I.V. Kotenko. Modelling attacks in self-organizing wireless sensor networks of smart cities // IOP Conference Series: Materials Science and Engineering. . "International Conference on Modern Trends in Manufacturing Technologies and Equipment, ICMTMTE 2020 - Materials Science" 2020. . 032077. DOI: 10.1088/1757-899X/971/3/032077 https://www.elibrary.ru/item.asp?id=45070170
  49. Diana Gaifulina, Igor Kotenko. Application of deep learning methods in cybersecurity tasks. Part 1 // Cybersecurity issues. 2020. No. 3 (37). P 76-86. DOI: 10.21681/2311-3456-2020-03-76-86 // https://elibrary.ru/item.asp?id=43976797 (in Russian).
  50. Ksenia Zhernova, Maxim Kolomeets, Igor Kotenko, Andrey Chechulin. Use of adaptive touch interface in information security applications // Cybersecurity issues. 2020. No. 1 (35). P. 18-28. DOI: 10.21681/2311-3456-2020-01-18-28 // https://elibrary.ru/item.asp?id=42739002 (in Russian).
  51. Branitskiy Alexander, Doynikova Elena, Kotenko Igor. Use of neural networks for forecasting of the exposure of social network users to destructive impacts // Information and Control Systems 2020. 1(104) pp. 24-33. DOI: 10.31799/1684-8853-2020-1-24-33 // https://elibrary.ru/item.asp?id=42714729 (in Russian).
  52. I. V. Kotenko, I. B. Parashchuk. Model of security information and event management system // Bulletin of the Astrakhan State Technical University. Series: Management, Computer Engineering and Computer Science. 2020. No. 2. pp. 84-94. DOI: 10.24143/2072-9502-2020-2-84-94 // https://www.elibrary.ru/item.asp?id=42708547 (in Russian).
  53. I. B. Saenko, I. V. Kotenko I. V. Using a role-based approach and genetic optimization for VLAN design in large critical infrastructures // Automation of control processes. 2020. No. 2 (60). pp. 81-88. DOI: 10.35752/1991-2927-2020-2-60-81-88 // https://elibrary.ru/item.asp?id=43154233 (in Russian).
  54. Diana Gaifulina, Igor Kotenko Application of deep learning methods in cybersecurity tasks. Part 2 // Questions of Cybersecurity. 2020. No. 4 (38). pp. 11-21. DOI: 10.21681/2311-3456-2020-04-11-21 // https://elibrary.ru/item.asp?id=44149486 (in Russian).
  55. I. Kotenko, B. Tynymbaev UEBA system for a cloud service provider // Information Protection. Insider. 2020. No. 4(94). . 15-19 // https://www.elibrary.ru/item.asp?id=43941322 (in Russian).
  56. I. V. Kotenko, N. A. Komashinsky, I. B. Saenko, A.V. Bashmakov. Methods and tools of parallel event processing for creating new generation of security monitoring systems // Informatization and Communication. 2020. No. 5. pp. 107-118. DOI: 10.34219/2078-8320-2020-11-5-107-118 // https://elibrary.ru/item.asp?id=44544630 (in Russian).
  57. I. V. Kotenko, I. V. Saenko, I. V. Lauta, A. M. Kribel. Analysis of the process of selfsimilarity of network traffic as an approach to detecting cyber attacks on computer networks // Telecommunications. 2020. No. 12. pp. 54-59. DOI: 10.34832/ELSV.2020.13.12.008 // https://elibrary.ru/item.asp?id=44368136 (in Russian).
  58. I.B. Paraschuk, I.V. Kotenko. Variant of analytical description of the security information and event management system // Mathematical methods in engineering and Technology (MMTT-33): proceedings of the International Scientific Conference. 2020. Vol. 1. . 40-44 // https://www.elibrary.ru/item.asp?id=42417073 (in Russian).
  59. I.A. Ushakov, I.V. Kotenko, A. Yu. Avramenko, A.I. Preobrazhensky, D/V. Pelevin. Combined approach to insider detection on computer networks // Bulletin of the St. Petersburg State University of Technology and Design. Series 1: Natural and Technical Sciences. 2020. No. 4. pp. 66-71. DOI: 10.46418/2079-8199_2020_4_10 // https://www.elibrary.ru/item.asp?id=44830245 (in Russian).
  60. Alexander Branitskiy, Polina Gladysheva, Vasily Desnitsky, Igor Kotenko. Implementation and evaluation of adaptation and retraining methods for the analysis of information objects in web-content // IX International Scientific, Technical and Scientific Methodological Conference "Actual Problems of Information Telecommunications in Science and Education" (APINO-2020). February 26-27, 2020. Collection of scientific articles. Volume 1. SPb., 2020. P. 154-158. // https://elibrary.ru/item.asp?id=44603985 (in Russian).
  61. Diana Gaifulina, Igor Kotenko. Analysis of deep learning methods for intrusion detection tasks // IX International Scientific, Technical and Scientific Methodological Conference "Actual Problems of Information Telecommunications in Science and Education" (APINO-2020). February 26-27, 2020. Collection of scientific articles. Volume 1. SPb., 2020. P. 308-313. // https://elibrary.ru/item.asp?id=44604018 (in Russian).
  62. A. A. Branitsky, E. V. Doynikova, I. V. Kotenko. Technique of classification of social network users by the psychological scales of the Ammon test based on artificial neural networks // Materials of the conference "Information Technologies in Management". 2020. P. 266-268 // https://elibrary.ru/item.asp?id=44686237 (in Russian).
  63. A.A. Bogatyrev, N.P. Vanchakova, N.V. Krasilnikova, A.V. Tishkov, E.A. Vatskel, I.V. Kotenko. Ecology of the Internet-communication in contemporary world and in Russia // Regional Informatics and Information Security. Collection of works. 2020. Release 8. .95-98. http://www.spoisu.ru/files/riib/riib_8_2020.pdf // https://www.elibrary.ru/item.asp?id=48027060 (in Russian).
  64. A.A. Branitsky, E.V. Doynikova, I.V. Kotenko. Technique for determination of social network users exposure to destructiveness // IX international scientific-technical and scientific-methodical conference "Actual problems of infotelecommunication in science and education" (APINO-2020)". February 26-27, 2020. Collection of scientific articles. 2020. Vol. 1. . 159-162. // https://www.elibrary.ru/item.asp?id=44603986 (in Russian).
  65. Yu. E. Bakhtin, S. N. Bushuev, D. A. Gaifulina, K. N. Zhernova, A. Yu. Ivanov, V. I. Komashinsky, I. V. Kotenko Methods of experimental evaluation of the effectiveness of human-computer interaction in visual analytics // IX International scientific-technical and scientific-methodological conference "Actual problems of infotelecommunications in science and education" (APINO-2020)". February 26-27, 2020. Collection of scientific articles. 2020. Vol. 1. . 120-123 // https://elibrary.ru/item.asp?id=44603978 (in Russian).
  66. K. N. Zhernova, N. A. Komashinsky, I. V. Kotenko. Models of visual human-computer interaction with the network of devices in the Internet of things // IX International scientific-technical and scientific-methodological conference " Actual problems of infotelecommunications in science and education "(APINO-2020)". February 26-27, 2020. Collection of scientific articles. 2020. Vol. 1. P. 466-470.// https://elibrary.ru/item.asp?id=44604049 (in Russian).
  67. D.A. Kleverov, I.V. Kotenko. Adaptation of bio-inspired algorithms for computer security analysis to big data technologies // IX International scientific-technical and scientific-methodological conference "Actual problems of infotelecommunications in science and education" (APINO-2020)". February 26-27, 2020. Collection of scientific articles. 2020. Vol. 1. P. 583-588 // https://www.elibrary.ru/item.asp?id=44604076 (in Russian).
  68. M.A. Kleverov, I.B. Kotenko. Big data feature selection using biclustering algorithms for the problem of cyber-attack detection // IX International scientific-technical and scientific-methodological conference "Actual problems of infotelecommunications in science and education" (APINO-2020)". February 26-27, 2020. Collection of scientific articles. 2020. Volume 1. pp. 588-592.// https://www.elibrary.ru/item.asp?id=44604077 (in Russian).
  69. M. V. Kolomeets, I. V. Kotenko, A. A. Chechulin. Architecture and implementation of visual interfaces for identification and opposition of unwanted, doubtful and harmful information // IX International scientific-technical and scientific-methodological conference "Actual problems of infotelecommunications in science and education" (APINO-2020)". February 26-27, 2020. Collection of scientific articles. 2020. Vol. 1. P. 606-609 // https://elibrary.ru/item.asp?id=44604081 (in Russian).
  70. N.A. Komashinsky, I.V. Kotenko. Methods for detecting computer attacks in high-load networks // IX International scientific-technical and scientific-methodological conference " Actual problems of infotelecommunications in science and education "(APINO-2020)". February 26-27, 2020. Collection of scientific articles. 2020. Vol. 1. P. 609-614 // https://www.elibrary.ru/item.asp?id=44604082 (in Russian).
  71. A. P. Pronichev, I. V. Kotenko. Modeling query processing processes in distributed big data storage systems // IX International scientific-technical and scientific-methodological conference " Actual problems of infotelecommunications in science and education "(APINO-2020)". February 26-27, 2020. Collection of scientific articles. 2020. Vol. 1. P. 620-624 // https://elibrary.ru/item.asp?id=44604084 (in Russian).
  72. I. V. Kotenko, B. A. Tynymbaev. Model and architecture of UEBA system for cloud service provider // IX International scientific-technical and scientific-methodological conference " Actual problems of infotelecommunications in science and education "(APINO-2020)". February 26-27, 2020. Collection of scientific articles. 2020. Vol. 1. P. 624-629 // https://www.elibrary.ru/item.asp?id=44604085 (in Russian).
  73. I.V. Kotenko, IA. Ushakov. Big data representation model about insider attacks in NOSQL format // IX International scientific-technical and scientific-methodological conference " Actual problems of infotelecommunications in science and education "(APINO-2020)". February 26-27, 2020. Collection of scientific articles. 2020. Vol. 1. P. 634-639. // https://www.elibrary.ru/item.asp?id=44604087 (in Russian).
  74. I.V. Kotenko, IA. Ushakov. Detection of insiders in computer networks based on expert rules and machine learning methods // IX International scientific-technical and scientific-methodological conference " Actual problems of infotelecommunications in science and education "(APINO-2020)". February 26-27, 2020. Collection of scientific articles. 2020. Vol. 1. P. 639-643.// https://www.elibrary.ru/item.asp?id=44604088&pff=1 (in Russian).
  75. I.V. Kotenko, A.V. Khinenzon. Analysis of algorithms for detecting suspicious behavior in social networks // IX International scientific-technical and scientific-methodological conference " Actual problems of infotelecommunications in science and education "(APINO-2020)". February 26-27, 2020. Collection of scientific articles. 2020. Vol. 1. P. 644-648. // https://www.elibrary.ru/item.asp?id=44604089&pff=1 (in Russian).
  76. D. A. Gaifulina, I. V. Kotenko Place and role of correlation of security events in cloud systems based on deep learning methods // XVII St. Petersburg International Conference " Regional Informatics (RI-2020)". St. Petersburg, October 28-30, 2020, part 1., p. 129-131 http://www.spoisu.ru/files/ri/ri2020/ri2020_materials_1.pdf // https://elibrary.ru/item.asp?id=49390763 (in Russian).
  77. N.A. Komashinsky, I.V. Kotenko. A technique of distributed detection of computer anomalies based on big data analysis // XVII St. Petersburg International Conference " Regional Informatics (RI-2020)". St. Petersburg, October 28-30, 2020, part 1., pp. 142-144 http://www.spoisu.ru/files/ri/ri2020/ri2020_materials_1.pdf // https://www.elibrary.ru/item.asp?id=49390756 (in Russian).
  78. N. A. Komashinsky, I. V. Kotenko. Theoretical-multiple model of distributed detection of computer attacks using signature analysis // XVII St. Petersburg International Conference " Regional Informatics (RI-2020)". St. Petersburg, October 28-30, 2020, part 1., pp. 144-146 http://www.spoisu.ru/files/ri/ri2020/ri2020_materials_1.pdf // https://www.elibrary.ru/item.asp?id=49390771 (in Russian).
  79. I. V. Kotenko, Yu. E. Bakhtin, S. N. Bushuev, N. A. Komashinsky. Methodology for designing a network security visualization and data management complex by means of touch screens // XVII St. Petersburg International Conference " Regional Informatics (RI-2020)". St. Petersburg, October 28-30, 2020, part 1., pp. 148-149 http://www.spoisu.ru/files/ri/ri2020/ri2020_materials_1.pdf // https://www.elibrary.ru/item.asp?id=49390770 (in Russian).
  80. A. P. Pronichev, I. V. Kotenko. Overview of approaches to design and evaluation of distributed big data processing systems // XVII St. Petersburg International Conference " Regional Informatics (RI-2020)". St. Petersburg, October 28-30, 2020, part 1., p. 172-173 http://www.spoisu.ru/files/ri/ri2020/ri2020_materials_1.pdf // https://elibrary.ru/item.asp?id=49390779 (in Russian).
  81. B.A. Tynymbaev, I.V. Kotenko. A model of user behavior analytics system // XVII St. Petersburg International Conference " Regional Informatics (RI-2020)". St. Petersburg, October 28-30, 2020, part 1, p. 179-180 http://www.spoisu.ru/files/ri/ri2020/ri2020_materials_1.pdf // https://www.elibrary.ru/item.asp?id=49390775&pff=1 (in Russian).
  82. I.V. Kotenko, I.B. Paraschuk, I.B. Saenko. Detection and opposition of network attacks based on traffic analysis: basic research directions // Perspective directions of development of domestic information technologies: materials of the VI interregional scientific and practical conference, Sevastopol, September 22-26, 2020, pp. 187-188. http://www.spoisu.ru/files/pnroit/pnroit-2020_materials.pdf // https://www.elibrary.ru/item.asp?id=45844802 (in Russian).
  83. K. N. Zhernova, I. V. Kotenko, A. A. Chechulin. Evaluation methodology of gestural interfaces for computer security management // Perspective directions of development of domestic information technologies: materials of the VI interregional scientific and practical conference, Sevastopol, September 22-26, 2020, . 219-220. http://www.spoisu.ru/files/pnroit/pnroit-2020_materials.pdf // https://elibrary.ru/item.asp?id=45844820 (in Russian).
  84. I. B. Saenko, O. S. Lauta, A.M. Kribel, I. V. Kotenko, I. V. Podguzov Research of the possibility of applying a fractal approach to detecting traffic anomalies and cyberattacks in computer networks // Materials of the 29th Scientific and Technical Conference "Methods and technical means of ensuring information security". September 28-30, 2020, Saint Petersburg. Polytechnical University publishing house. 2020. 29,P. 54-55. // https://www.elibrary.ru/item.asp?id=44017268 (in Russian).
  85. I.B. Paraschuk, I.B. Saenko, I.V. Kotenko. Theoretical and experimental analysis of the component of removing uncertainty evaluating and categorizing the semantic content of information objects // Materials of the conference " Information Technologies in Management "(ITU-2020). St. Petersburg: JSC "Concern "Central Research Institute"Electropribor". 2020. P. 243-246. // https://www.elibrary.ru/item.asp?id=44686231 (in Russian).
  86. A. A. Bogatyrev, A. A. Branitsky, N. P. Vanchakova, E. V. Doynikova, I. V. Kotenko, N. V. Krasilnikova, D. S. Levshun, A.V. Tishkov Methods of identifying and preventing destructive formats of communicative behavior of young people in social networks // Proceedings of the conference "Neuroinformatics-2020". P. 388-397 // https://elibrary.ru/item.asp?id=46415288 (in Russian).
  87. E.V. Doynikova, E.S. Novikova, D.A. Gayfullina, I.V. Kotenko. Defining a set of attributes for forming an attacker's profile when analyzing information security risks // In the book: Regional Informatics (RI-2020). XVII St. Petersburg International Conference. Conference materials. St. Petersburg, 2020. pp. 136-137. // https://www.elibrary.ru/item.asp?id=49390591 (in Russian).
  88. A.A. Bogatyrev, N.P. Vanchakova, E.A. Vatskel, I.V. Kotenko, N.V. Krasilnikova, A.V. Tishkov. Pedagogical technology "web quest" as a tool for preventing destructive behavior of young people in social Internet networks // In the collection: Actual problems of infotelecommunications in science and education (APINO 2020). IX International Scientific-technical and scientific-methodical Conference: collection of scientific articles. Saint Petersburg, 2020.Vol.4, pp. 263-268. // https://www.elibrary.ru/item.asp?id=44627781 (in Russian).
  89. I.V. Kotenko, B.A. Tynymbaev. Comparative analysis of solutions for building UBA and UEBA prospective systems // Actual problems of infotelecommunications in science and education (APINO 2020). IX International Scientific-technical and scientific-methodical Conference: collection of scientific articles. St. Petersburg, 2020. Vol.1, pp. 629-634. // https://www.elibrary.ru/item.asp?id=44604086 (in Russian).

2019

  1. Vasily Desnitsky, Igor Kotenko, Danil Zakoldaev. Evaluation of Resource Exhaustion Attacks against Wireless Mobile Devices // Electronics. 2019. . 8. 5. . 500, https://doi.org/10.3390/electronics8050500 // https://elibrary.ru/item.asp?id=41630344
  2. Kotenko I., Parashchuk I. Analysis of the Sensitivity of Algorithms for Assessing the Harmful Information Indicators in the Interests of Cyber-Physical Security // Electronics (switzeland) 2019. vol. 8, no. 3. P. 284-291 https://doi.org/10.3390/electronics8030284 DOI: 10.3390/electronics8030284 // https://www.elibrary.ru/item.asp?id=38746576 (WoS, Scopus, SJR=0.46, Q1).
  3. Igor Kotenko, Igor Saenko, Sergey Ageev. Hierarchical fuzzy situational networks for online decision-making: Application to telecommunication systems // Knowledge Based Systems (KBSs). 2019. vol 185. . 104935. DOI: 10.1016/j.knosys.2019.104935 // https://doi.org/10.1016/j.knosys.2019.104935 // https://elibrary.ru/item.asp?id=41646866 (WoS, Scopus, SJR=1.46, Q1)
  4. Andrey Privalov, Vera Lukicheva, Igor Kotenko, Igor Saenko. Method of early detection of cyber-attacks on telecommunication networks based on traffic analysis by extreme filtering // Energies, 2019, 12(24), . 4768-4777;DOI: 10.3390/en12244768 // https://doi.org/10.3390/en12244768. 13 Dec 2019. 14 p. https://www.mdpi.com/1996-1073/12/24/4768 // https://elibrary.ru/item.asp?id=43229731(Q1, WoS, Scopus, SJR=0.61, Q1)
  5. Maxim Kolomeets, Andrey Chechulin, and Igor Kotenko. Social networks analysis by graph algorithms on the example of the VKontakte social network // Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 2019, Vol. 10, No. 2, P. 55-75. https://doi.org/10.22667/JOWUA.2019.06.30.055 (Q2, Scopus). // https://elibrary.ru/item.asp?id=41699611
  6. Andrey Fedorchenko, Elena Doynikova, Igor Kotenko. Determination of System Weaknesses based on the Analysis of Vulnerability Indexes and the Source Code of Exploits // Journal of Universal Computer Science. 2019, Vol. 25, No. 9. pp. 1043-1065. http://www.jucs.org/jucs_25_9/ determination_of_system_ weaknesses. (WoS, Scopus, SJR=0.33, Q2). DOI: 10.3217/jucs-025-09-1043 // https://elibrary.ru/item.asp?id=45166166
  7. Igor Kotenko, Sergey Ageev, Igor Saenko. Applying fuzzy computing methods for on-line monitoring of new generation network elements // Advances in Intelligent Systems and Computing. 2019. . 874. . 331-340. DOI: 10.1007/978-3-030-01818-4_33 // https://elibrary.ru/item.asp?id=38636559
  8. Maxim Kolomeets, Andrey Chechulin, Igor Kotenko, Martin Strecker. Voronoi maps for planar sensor networks visualization // Communications in Computer and Information Science. 2019. . 971. . 96-109. DOI: 10.1007/978-981-13-3732-1_7 // https://elibrary.ru/item.asp?id=38663581
  9. Anton Pronoza, Lidia Vitkova, Andrey Chechulin, Igor Kotenko. Visual analysis of information dissemination channels in social network for protection against inappropriate content // Advances in Intelligent Systems and Computing. Vol. 875, 2019. P. 95-105. DOI: 10.1007/978-3-030-01821-4_11 // https://elibrary.ru/item.asp?id=38635986
  10. Alexander Branitskiy, Dmitry Levshun, Natalia Krasilnikova, Elena Doynikova, Igor Kotenko, Artem Tishkov, Nina Vanchakova, and Andrey Chechulin. Determination of Young Generations Sensitivity to the Destructive Stimuli based on the Information in Social Networks // Journal of Internet Services and Information Security (JISIS), Vol. 9, No. 3, August 2019. P. 1-20. DOI: 10.22667/JISIS.2019.08.31.001 // URL: http://isyou.info/jisis/vol9/no3/jisis-2019-vol9-no3-01.pdf. (Scopus, WoS, SJR=0.18, Q4) // https://elibrary.ru/item.asp?id=41700137
  11. Iuliia Kim, Ilya Viksnin, Igor Kotenko. Automated centroid tuning based on particle swarm optimization in the image clustering process // International Journal of Computer Science & Applications (IJCSA). 2019. vol. 16. no. 1. pp. 17-37. (WoS, Scopus, SJR=0.13, Q4).
  12. Igor Kotenko, Pavel Budko, Alexey Vinogradenko, Igor Saenko. An Approach for Intelligent Evaluation of the State of Complex Autonomous Objects Based on the Wavelet Analysis // Frontiers in Artificial Intelligence and Applications. 2019. . 318. . 25-38. DOI: 10.3233/FAIA190036 // https://elibrary.ru/item.asp?id=43252618
  13. A. Branitskiy, I. Kotenko. Attack Detection in Mobile Internet and Networks using the Graph-based Schemes for Combining the Support Vector Machines // Communications in Computer and Information Science. 2019. . 971. . 1-16. DOI: 10.1007/978-981-13-3732-1_1 // https://elibrary.ru/item.asp?id=38663533
  14. Igor Kotenko, Igor Saenko, Oleg Lauta. Modeling the Impact of Cyber Attacks // In book: Cyber Resilience of Systems and Networks (pp.135-169), January 2019. DOI:10.1007/978-3-319-77492-3_7, https://doi.org/10.1007/978-3-319-77492-3_7.
  15. Maxim Kolomeets, Amira Benachour, Didier El Baz, Andrey Chechulin, Martin Strecker, and Igor Kotenko. Reference architecture for social networks graph analysis // Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 2019, Vol. 10, No. 4, P. 109-125. http://isyou.info/jowua/papers/jowua-v10n4-7.pdf (Q2, Scopus), DOI: 10.22667/JOWUA.2019.12.31.109 //https://elibrary.ru/item.asp?id=43235758
  16. Elena Doynikova, Andrey Fedorchenko, Igor Kotenko. Detection of Weaknesses in Information Systems for Automatic Selection of Security Actions // Automatic Control and Computer Sciences. 2019. . 53. 8. . 1029-1037. DOI: 10.3103/S014641161908008X // https://elibrary.ru/item.asp?id=43268189
  17. Alexander Branitskiy, Igor Kotenko. Applying artificial intelligence methods to network attack detection // Intelligent Systems Reference Library. 2019. . 151. . 115-149. DOI: 10.1007/978-3-319-98842-9_5 // https://elibrary.ru/item.asp?id=35751400 (, Scopus)
  18. Evgenia Novikova, Igor Kotenko. Visualization-Driven Approach to Fraud Detection in the Mobile Money Transfer Services // In book: Algorithms, Methods, and Applications in Mobile Computing and Communications P .205-236 DOI:10.4018/978-1-5225-5693-0.ch009
  19. Ivo Berger, Roland Rieke, Maxim Kolomeets, Andrey Chechulin, Igor Kotenko. Comparative study of machine learning methods for in-vehicle intrusion detection // Lecture Notes in Computer Science. 2019. . 11387 LNCS. . 85-101. DOI: 10.1007/978-3-030-12786-2_6 // https://elibrary.ru/item.asp?id=38656424
  20. M. Kolomeets, A. Chechulin, I. Kotenko. Social networks analysis by graph algorithms on the example of the v kontakte social network // Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications. 2019. . 10. 2. . 55-75. DOI: 10.22667/JOWUA.2019.06.30.055 // https://elibrary.ru/item.asp?id=41699611
  21. Ilsun You, Vishal Sharma, Hsing-Chung Chen, Igor Kotenko. Mobile Internet Security (Second International Symposium, MobiSec 2017, Jeju Island, Republic of Korea, October 1922, 2017, Revised Selected Papers) // Publisher: Springer SingaporeISBN: 978-981-13-3731-4, January 2019. DOI:10.1007/978-981-13-3732-1
  22. Igor Kotenko, Igor Saenko, Sergey Ageev. Applying Intelligent Agents for Anomaly Detection of Network Traffic in Internet of Things Networks // 2018 IEEE International Conference on Internet of Things and Intelligence System (IoTaIS 2018). Bali, Indonesia. 1-3 November, 2018. 2019. . 123-129. DOI: 10.1109/IOTAIS.2018.8600867 // https://elibrary.ru/item.asp?id=38639777 (WoS and Scopus)
  23. Andrey Chechulin, Igor Kotenko. Application of image classification methods for protection against inappropriate information in the Internet // The 2018 International Conference on Internet of Things and Intelligence Systems (IoTaIS 2018). Bali, Indonesia. 1-3 November, 2018. IEEE Xplore, 2019. P.167-173 DOI: 10.1109/IOTAIS.2018.8600896 // https://elibrary.ru/item.asp?id=38639482
  24. Maxim Kolomeets, Andrey Chechulin, Igor Kotenko, Igor Saenko. Access Control Visualization Using Triangular Matrices // : 2019 27th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP). 2019. . 348-355. DOI: 10.1109/EMPDP.2019.8671578 // https://elibrary.ru/item.asp?id=38327114
  25. Dmitry Levshun, Andrey Chechulin, Igor Kotenko, Yannick Chevalier. Design and verification methodology for secure and distributed cyber-physical systems // 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS), Canary Islands, Spain, 2019. P. 8763814 DOI: 10.1109/NTMS.2019.8763814 // https://elibrary.ru/item.asp?id=41651124
  26. Vasily Desnitsky, Igor Kotenko, Nikolay Rudavin. Protection Mechanisms against Energy Depletion Attacks in Cyber-Physical Systems // Proceedings of the 2019 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering, ElConRus 2019, Saint Petersburg - Moscow,J anuary 28-30, 2019, pp. 214-219, 2019. DOI: 10.1109/EIConRus.2019.8656795 // https://elibrary.ru/item.asp?id=38701751
  27. Desnitsky V.A., Kotenko I.V., Parashchuk I.B. Methods of assessing the effectiveness of network content processing systems for detecting malicious information9 taking into account the elimination of uncertainty in the semantic content of information objects // Proceedings of 2019 22nd International Conference on Soft Computing and Measurements, SCM 2019. 22. 2019. . 41-44. DOI: 10.1109/SCM.2019.8903670 // https://www.elibrary.ru/item.asp?id=43213385 (WoS, Scopus).
  28. Igor Kotenko, Igor Saenko I., Alexander Branitskiy. Improving the Performance of Manufacturing Technologies for Advanced Material Processing Using a Big Data and Machine Learning Framework // : Materials Today: Proceedings. 2019. . 380-385. DOI: 10.1016/j.matpr.2018.12.162 // https://elibrary.ru/item.asp?id=39000243
  29. Igor Kotenko, Igor Saenko, Alexei Kushnerevich, Alexander Branitskiy. Attack detection in IoT critical infrastructures: a machine learning and big data processing approach // Proceedings - 27th Euromicro International Conference on Parallel, Distributed and Network-Based Processing, PDP 2019. 27. 2019. . 340-347. DOI: 10.1109/EMPDP.2019.8671571 // https://elibrary.ru/item.asp?id=38662631
  30. I. Kotenko, I. Parashchuk. An approach to modeling the decision support process of the security event and incident management based on Markov chains // IFAC-PapersOnLine. 9th IFAC Conference on Manufacturing Modelling, Management and Control, MIM 2019. 2019. . 934-939. DOI: 10.1016/j.ifacol.2019.11.314 // https://www.elibrary.ru/item.asp?id=43236275
  31. Lidia Vitkova, Vasily Desnitsky, Andrey Chechulin, Igor Kotenko. Approach to organizing of a heterogeneous swarm of cyber-physical devices to detect intruders // : IFAC-PapersOnLine. 9th IFAC Conference on Manufacturing Modelling, Management and Control, MIM 2019. 2019. . 945-950. DOI: 10.1016/j.ifacol.2019.11.316 https://www.elibrary.ru/item.asp?id=43243011
  32. Diana Gaifulina, Andrey Fedorchenko, Igor Kotenko. Network Protocols Determination Based on Raw Data Analysis for Security Assesment under Uncertainty // The 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS 2019). 18-21 September, 2019, Metz, France. pp. 163-167. DOI: 10.1109/IDAACS.2019.8924349 // https://elibrary.ru/item.asp?id=43217877 (WoS, Scopus).
  33. A. Branitskiy, A. Fedorchenko, I. Kotenko, I. Saenko. An Approach to Intelligent Distributed Scanning and Analytical Processing of the Internet Inappropriate Information // The 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS 2019). 18-21 September, 2019, Metz, France. pp. 146-151. DOI: 10.1109/IDAACS.2019.8924380 // https://elibrary.ru/item.asp?id=43221671 (WoS, Scopus).
  34. Igor Kotenko, Igor Parashchuk. Decomposition and formulation of system of features of harmful information based on fuzzy relationships // : Proceedings - 2019 International Russian Automation Conference, RusAutoCon 2019. 2019. . 8867768. DOI: 10.1109/RUSAUTOCON.2019.8867768, URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8867768& isnumber=8867588. // https://www.elibrary.ru/item.asp?id=41711204 (WoS, Scopus).
  35. I. Saenko, I. Kotenko. A Role-Base Approach and a Genetic Algorithm for VLAN Design in Large Critical Infrastructures // Proceedings of ACM Genetic and Evolutionary Computation Conference Companion (GECCO), Prague, Czech Republic, July 2019 (GECCO19). pp. 1643-1650. DOI: 10.1145/3319619.3326853 // https://elibrary.ru/item.asp?id=41626641 (WoS, Scopus, SJR=0.17).
  36. I. Parashchuk, I. Kotenko. Formulation of a system of indicators of information protection quality in automatic systems of numerical control machines for advanced material processing // : Materials Today: Proceedings. International Conference on Modern Trends in Manufacturing Technologies and Equipment, ICMTMTE 2019. 2019. . 1835-1840. DOI: 10.1016/j.matpr.2019.07.023 // https://www.elibrary.ru/item.asp?id=43266444
  37. Kotenko I., Parashchuk I. Multi-criteria security assessment of control and diagnostic data on the technological processes // International Conference on Modern Trends in Manufacturing Technologies and Equipment: Mechanical Engineering and Materials Science (ICMTMTE 2019) Vol. 298, . 00071, DOI:10.1051/matecconf/201929800071
  38. Elena Doynikova, Andrey Fedorchenko, Igor Kotenko. Automated Revealing of Organizational Assets based on Event Correlation // : 2019 10th IFIP International Conference on New Technologies, Mobility and Security, NTMS 2019 - Proceedings and Workshop. 10. 2019. . 8763843. DOI: 10.1109/NTMS.2019.8763843 // https://www.elibrary.ru/item.asp?id=41677256
  39. Elena Doynikova, Andrey Fedorchenko, Igor Kotenko. Ontology of metrics for cyber security assessment // : ACM International Conference Proceeding Series. Proceedings of the 14th International Conference on Availability, Reliability and Security, ARES 2019. 2019. . 3341496. DOI: 10.1145/3339252.3341496 // https://elibrary.ru/item.asp?id=41627655
  40. I. Kotenko, I. Saenko, Y. Sineshchuk, V. Kuvatov, O. Chudakov. Optimization of the cyber Security System Structure Based on Accounting of the Prevented Damage Cost // : ACM International Conference Proceeding Series. Proceedings of the 12th International Conference on Security of Information and Networks, SIN 2019. 2019. . 3357620. DOI: 10.1145/3357613.3357620 // https://elibrary.ru/item.asp?id=43230718 (WoS and Scopus).
  41. Igor Kotenko, Nickolay Komashinsky. Combining Spark and Snort Technologies for Detection of Network Attacks and Anomalies: Assessment of Performance for the Big Data Framework // ACM International Conference Proceeding Series. Proceedings of the 12th International Conference on Security of Information and Networks, SIN 2019. 2019. . 3357630. DOI: 10.1145/3357613.3357630 // https://www.elibrary.ru/item.asp?id=43224063
  42. Vasily Desnitsky, Igor Kotenko. Monitoring the State of Materials in Cyberphysical Systems: Water Supply Case Study // Materials Today: Proceedings. 2019. P. 410-416. 2019. DOI: 10.1016/j.matpr.2019.01.005 // https://elibrary.ru/item.asp?id=39002730
  43. I. Kotenko, I. Saenko, A. Branitskiy. Detection of Distributed Cyber Attacks Based on Weighted Ensembles of Classifiers and Big Data Processing Architecture // INFOCOM 2019 - IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2019. 2019. . 9093774. DOI: 10.1109/INFOCOMWKSHPS47286.2019.9093774 // https://elibrary.ru/item.asp?id=45469616
  44. Evgenia Novikova, Igor Kotenko. Open challenges in visual analytics for security information and event management // Information & Control Systems. 2019. no. 2. pp. 57-67. DOI: 10.31799/1684-8853-2019-2-57-67 https://cyberleninka.ru/article/n/otkrytye-zadachi-vizualnogo-analiza-v-sistemah-upravleniya-informatsionnoy-bezopasnostyu/viewer // https://elibrary.ru/item.asp?id=41138301 (in Russian).
  45. Andrey Fedorchenko, Elena Doynikova, Igor Kotenko. Automated detection of assets and calculation of their criticality for the analysis of information system security // SPIIRAS Proceedings. 2019. vol. 18. no 5. pp. 1182-1211. DOI: 10.15622/sp.2019.18.5.1182-1211 (Scopus, SJR: 0.17, Q3). // https://elibrary.ru/item.asp?id=40938369 (in Russian).
  46. Igor Parashchuk, Igor Kotenko, Sergey Ostroverkhiy. Assessing the correlation of monitoring concepts in the interests of detecting malicious information and the provisions of the quality management of information and analytical systems // Information and spacn. 2019. 2. pp. 50-55. (HAC, RSCI, impact-factor 0,277). // https://www.elibrary.ru/item.asp?id=38245716 (in Russian).
  47. Igor Kotenko, Igor Ushakov, Dmitry Pelevin, Alexander Ovramenko. Hybrid NoSQL database model for analysis of network traffic // Information security. Inside. 2019. no 1(85). pp. 46-54. // https://elibrary.ru/item.asp?id=37055268 (in Russian).
  48. Igor Kotenko, Igor Ushakov, Dmitry Pelevin, Alexander Preobrazhenskiy, Alexander Ovramenko. Identification of insiders in the corporate network: UBA and UEBA based approach // Information security. Inside. 2019. 5(89). pp. 26-35. // https://elibrary.ru/item.asp?id=41221380 (in Russian).
  49. Igor Kotenko, Igor Saenko, Vladimir Avramenko. Conceptual approach to ensuring information security of a system of distributed situational centers // Informatization and communication. 2019. no. 3. pp. 37-42. DOI:10.34219/2078-8320-2019-10-3-37-43. // https://elibrary.ru/item.asp?id=41472114 (in Russian).
  50. Igor Kotenko, Igor Parashchuk. Verification of unreliable parameters of the malicious information detection model // Herald of the Astrakhan State Technical University. Series Management, Computing and Informatics. 2019. no. 2. pp. 7-18. DOI: 10.24143/2072-9502-2019-2-7-18. // https://www.elibrary.ru/item.asp?id=37261366 (in Russian).
  51. Dmitry Levshun, Andrey Chechulin, Igor Kotenko. A comprehensive model of secure cyber-physical systems for their design and verification // Proceedings of Educational Institutions of Communication. 2019. Vol. 5, No. 4. P. 114-123. DOI: 10.31854/1813-324X-2019-5-4-114-123 // https://elibrary.ru/item.asp?id=41664180 (in Russian).
  52. Diana Gaifulina, Andrey Fedorchenko, Igor Kotenko. Lexical marking of network traffic data for security assessment // Information security. Inside. 2019. . 6(90). pp. 56-60. // https://elibrary.ru/item.asp?id=41494731 (in Russian).
  53. Nina Vanchakova, Andrey Bogatyrev, Natalia Krasilnikova, Diana Gaifulina, Igor Kotenko, Alexander Branitskiy. Media portrait of an individual as a basis for identifying the destructive style of interaction of young people in social network // Modern High Technologies, 2019. 11-2 . 319-325. DOI: 10.17513/snt.37811 // https://elibrary.ru/item.asp?id=41594376 (in Russian).
  54. Dmitry Levshun, Igor Kotenko, Andrey Chechulin. Technique for design and verification of secure cyber-physical systems // Bulletin of the St. Petersburg State University of Technology and Design. Series 1. Natural and technical sciences. 2019. No. 4. P. 19-22. // https://elibrary.ru/item.asp?id=42485910 (in Russian).
  55. Igor Kotenko, Dmitry Levshun, Igor Saenko. Verification of Access Control Policies based on Attributes in Cloud Infrastructures based on Model Checking // Systems of Control, Communication and Security, 2019. 4. P. 421-436. DOI: 10.24411/2410-9916-2019-10417 // https://elibrary.ru/item.asp?id=41567826 (in Russian).
  56. Diana Gaifulina, Igor Kotenko, Andrey Fedorchenko. A Technique for Lexical Markup of Structured Binary Data for Problems of Protocols Analysis in Uncertainty Conditions // Systems of Control, Communication and Security, 2019, 4, pp. 280-299. DOI: 10.24411/2410-9916-2019-10411. // https://elibrary.ru/item.asp?id=41567819 (in Russian).
  57. I.V. Kotenko. Research and development of an integrated security system based on embedded intelligent microcontrollers // In the collection: Challenges of the digital economy: markets, industries, platforms and technologies. collection of scientific papers. Kirov, 2019. pp. 30-32. // https://elibrary.ru/item.asp?id=38429455 (in Russian).
  58. Igor Kotenko, Andrey Chechulin, Ksenia Zhernova. Comparison of realizations of gestural interfaces for network security management // Perspective directions of development of domestic information technologies: materials of the V Interregional scientific and practical conference. Sevastopol, September 24-28, 2019 (collection of conference abstracts) P. 329-330. // https://elibrary.ru/item.asp?id=42944632 (in Russian).
  59. Vasily Desnitsky, Igor Kotenko, Igor Parashchuk. Methodology for evaluating the effectiveness of network content processing systems for detecting malicious information, taking into account the elimination of uncertainties in the semantic content of information objects // International Conference on Soft Computing and Measurements. T. 1. P. 62-65. 2019. // https://www.elibrary.ru/item.asp?id=38309100 (in Russian).
  60. Igor Kotenko, Igor Parashchuk. Determination of the parameters of the mathematical model of the malicious information search process // Collection of reports of the international scientific conference "Mathematical Methods in Engineering and Technology" (MMTT-32), June 3-7, 2019 St. Petersburg. pp. 68-72. // https://www.elibrary.ru/item.asp?id=38577391 (in Russian).
  61. Nikolay Komashinsky, Igor Kotenko. Analysis of models and systems of parallel processing of events for the detection of information security incidents // VIII International scientific-technical and scientific-methodological Conference "Actual problems of infotelecommunications in science and education" (APINO 2019). St. Petersburg, February 27-28, 2019 (collection of scientific articles) Vol. 1. pp. 551-556 https://www.sut.ru/doci/nauka/1AEA/APINO/8-APINO%202019.%20.1.pdf // https://www.elibrary.ru/item.asp?id=41383593 (in Russian).
  62. Nikolay Komashinskiy, Igor Kotenko. An intrusion detection model with the use of signature methods and big data technologies // VIII International Scientific-Technical and Scientific-Methodological Conference "Actual Problems of Information Telecommunications in Science and Education" (APINO 2019). 2019. vol. 1. pp. 556-561. https://www.sut.ru/doci/nauka/1AEA/APINO/8-APINO%202019.%20.1.pdf // https://www.elibrary.ru/item.asp?id=41383594 (in Russian).
  63. Igor Kotenko, Bolat Tynymbaev. Architecture of Advanced UEBA System for Cloud Service Providers // VIII International scientific-technical and scientific-methodological Conference "Actual problems of infotelecommunications in science and education" (APINO 2019). St. Petersburg, February 27-28, 2019 (collection of scientific articles) Vol. 1. pp. 581-585. https://www.sut.ru/doci/nauka/1AEA/APINO/8-APINO%202019.%20.1.pdf // https://elibrary.ru/item.asp?id=41383599 (in Russian).
  64. Bolat Tynymbaev, Igor Kotenko. Review of UEBA Class Solutions // VIII International Scientific-Technical and Scientific-Methodological Conference "Actual Problems of Information Telecommunications in Science and Education" (APINO 2019). 2019. vol. 1. pp. 585-590. https://www.sut.ru/doci/nauka/1AEA/APINO/8-APINO%202019.%20.1.pdf // https://elibrary.ru/item.asp?id=41383600 (in Russian).
  65. Yurii Bakhtin, Sergey Bushuev, Maxim Kolomeets, Nikolai Komashinskiy, Igor Kotenko. Computer-human interaction algorithms for touch screens in a computer network visualization system // VIII International Scientific-Technical and Scientific-Methodological Conference "Actual Problems of Information Telecommunications in Science and Education" (APINO 2019). 2019. Vol. 1. pp. 123-127. // https://elibrary.ru/item.asp?id=41383506 (in Russian).
  66. Sergey Ageev, Alexander Ivanov, Maxim Kolomeets, Vladimir Komashinskiy, Igor Kotenko. The architecture of the computer network visualization system based on touch screens and augmented reality // VIII International Scientific-Technical and Scientific-Methodological Conference "Actual Problems of Information Telecommunications in Science and Education" (APINO 2019). 2019. vol. 1. pp. 33-36. // https://elibrary.ru/item.asp?id=41383488 (in Russian).
  67. Nina Vanchakova, Lidia Vitkova, Igor Kotenko, Natalia Krasilnikova, Luvov Strah, Artem Tishkov, Andrey Chechulin. Signs and criteria of personality destructiveness and destructive impact based on Internet content and the behavior of subjects in social networks // VIII International Scientific-Technical and Scientific-Methodological Conference "Actual Problems of Information Telecommunications in Science and Education" (APINO 2019). 2019. V.2, P. 133-138. https://www.sut.ru/doci/nauka/1AEA/APINO/8-APINO%202019.%20.2.pdf //https://elibrary.ru/item.asp?id=42504986 (in Russian).
  68. Alexander Branitskiy, Nina Vanchakova, Elena Doynikova, Igor Kotenko, Natalia Krasilnikova, Igor Saenko, Artem Tishkov. Common approach to the determination of destructive information impacts and negative personal trends of young generation using the techniques based on neural networks for internet content processing // 8th International Conference on Advanced Infotelecommunications (ICAIT 2019). February 27-28, 2019. Conference proceedings. Russia, St. Petersburg. vol. 1. pp. 164-167 https://www.sut.ru/doci/nauka/1AEA/APINO/8-APINO%202019.%20.1.pdf // https://elibrary.ru/item.asp?id=41383514 (in Russian).
  69. Lidia Vitkova, Igor Kotenko, Andrey Fedorchenko, Alexandra Khinenzon. Distributed data collection and processing in systems of monitoring of information space social networking // VIII International Scientific-Technical and Scientific-Methodological Conference "Actual Problems of Information Telecommunications in Science and Education" (APINO 2019). 2019. Vol. 1. pp. 228-232. https://www.sut.ru/doci/nauka/1AEA/APINO/8-APINO%202019.%20.1.pdf // https://elibrary.ru/item.asp?id=41383528 (in Russian).
  70. Igor Kotenko, Olga Tushkanova. A version of the system architecture for analyzing information objects on the Internet using parallel computing // VIII International Scientific-Technical and Scientific-Methodological Conference "Actual Problems of Information Telecommunications in Science and Education" (APINO 2019). 2019. vol. 1. pp. 577-580. https://www.sut.ru/doci/nauka/1AEA/APINO/8-APINO%202019.%20.1.pdf // https://elibrary.ru/item.asp?id=41383598 (in Russian).
  71. Igor Kotenko, Dmitry Pelevin, Igor Ushakov. General Technique of Computer Network Insider Detection Based on Big Data Technology // VIII International Scientific-Technical and Scientific-Methodological Conference "Actual Problems of Information Telecommunications in Science and Education" (APINO 2019). 2019. Vol. 1. pp. 572-576. https://www.sut.ru/doci/nauka/1AEA/APINO/8-APINO%202019.%20.1.pdf // https://elibrary.ru/item.asp?id=41383597 (in Russian).
  72. Igor Kotenko, Alexander Ovramenko, Igor Ushakov. Architecture and program prototype of insider detection system in computer network based on big data technologies // VIII International Scientific-Technical and Scientific-Methodological Conference "Actual Problems of Information Telecommunications in Science and Education" (APINO 2019) Vol. 1. pp. 568-572. https://www.sut.ru/doci/nauka/1AEA/APINO/8-APINO%202019.%20.1.pdf // https://elibrary.ru/item.asp?id=41383596 (in Russian).
  73. Artem Tishkov, Lyubov Strakh, Nina Vanchakova, Natalya Krasilnikova, Igor Kotenko, Alexander Branitskiy. Statistical analysis of i-functions interrelation of undergraduate students // XI St. Petersburg Interregional Conference Information Security of Russian Regions (ISRR-2019), October 23-25, 2019, Russia, St. Petersburg. 2019. pp. 374-376 http://www.spoisu.ru/files/ibrr/ibrr2019/ibrr2019_materials.pdf // https://elibrary.ru/item.asp?id=45839425 (in Russian).
  74. Alexander Branitskiy, Lidia Vitkova, Igor Saenko, Andrey Chechulin, Elena Doynikova, Igor Kotenko, Artem Tishkov, Nina Vanchakova. Appying neural networks for predicting the results of the Ammon's test using the profile of social networks // XI St. Petersburg Interregional Conference Information Security of Russian Regions (ISRR-2019), October 23-25, 2019, Russia, St. Petersburg. 2019. pp.100-101. http://www.spoisu.ru/files/ibrr/ibrr2019/ibrr2019_materials.pdf // https://www.elibrary.ru/item.asp?id=45839427 (in Russian).
  75. Igor Parashchuk, Igor Kotenko, Igor Saenko. To the question of the formal description of the problem of adaptive observation, evaluation and prediction of signs of unwanted information to ensure the security of cyber-physical-social systems // The V interregional scientific and practical conference "Perspective directions of development of domestic information technologies". September 24-28, 2019, Russia, Sevastopol. pp. 269-271. // https://elibrary.ru/item.asp?id=42944605 (in Russian).
  76. Lidia Vitkova, Elena Doynikova, Igor Kotenko. Model of Responses Against Unwanted, Questionable and Malicious Information on the Internet // VIII International scientific-technical and scientific-methodological Conference "Actual problems of infotelecommunications in science and education" (APINO 2019). St. Petersburg, February 27-28, 2019 (collection of scientific articles) Vol.1. pp. 223-227. https://www.sut.ru/doci/nauka/1AEA/APINO/8-APINO%202019.%20.1.pdf // https://elibrary.ru/item.asp?id=41383527 (in Russian).
  77. Alexey Pronichev, Igor Kotenko. Perspective areas of application of multiagent systems // XI St. Petersburg Interregional Conference Information Security of Russian Regions (ISRR-2019), October 23-25, 2019, Russia, St. Petersburg. 2019. pp. 464-466. http://www.spoisu.ru/files/ibrr/ibrr2019/ibrr2019_materials.pdf // https://elibrary.ru/item.asp?id=45839645 (in Russian).
  78. I.V. Kotenko, K.N. Zhernova. Visual model of a computer network with support for a gesture control interface // Promising directions of development of domestic information technologies. materials of the V interregional scientific and practical conference. Sevastopol State University; St. Petersburg Institute of Informatics and Automation of the Russian Academy of Sciences. Sevastopol, 2019. pp. 327-328.// https://elibrary.ru/item.asp?id=42944631 (in Russian).
  79. N.A Komyshinsky, I.V. Kotenko. Ensuring information security using big data technology // Promising directions of development of domestic information technologies. materials of the V interregional scientific and practical conference. Sevastopol State University; St. Petersburg Institute of Informatics and Automation of the Russian Academy of Sciences. Sevastopol, 2019. pp. 266-268. // https://www.elibrary.ru/item.asp?id=42944604 (in Russian).

2018

  1. Igor Kotenko, Igor Saenko, Sergey Ageev. Hierarchical Fuzzy Situational Networks for Online Decision Support in Distributed Cyber-Physical Systems // Frontiers in Artificial Intelligence and Applications. 2018. . 303. . 623-636. (Q4, Scopus) DOI: 10.3233/978-1-61499-900-3-623 // https://elibrary.ru/item.asp?id=38686359
  2. Elena Doynikova, Igor Kotenko. An automated graph based approach to risk assessment for computer networks with mobile components // Communications in Computer and Information Science. 2018. . 797. . 95-106. DOI: 10.1007/978-981-10-7850-7_9 // https://www.elibrary.ru/item.asp?id=35502078
  3. Igor Kotenko, Igor Saenko, Oleg Lauta, Mikhail Kocinyak. Assessment of computer network resilience under impact of cyber attacks on the basis of stochastic networks conversion // Communications in Computer and Information Science. 2018. . 797. . 107-117. DOI: 10.1007/978-981-10-7850-7_10 // https://elibrary.ru/item.asp?id=35514911
  4. Igor Kotenko, Igor Saenko, Alexander Branitskiy. Framework for Mobile Internet of Things Security Monitoring based on Big Data Processing and Machine Learning // IEEE Access, 2018, Vol.6. P. 72714-72723 DOI: 10.1109/ACCESS.2018.2881998 // https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8539995 // https://elibrary.ru/item.asp?id=38631720 (Q1, WoS and Scopus)
  5. Igor Saenko, Igor Kotenko. Genetic Algorithms for solving Problems of Access Control Design and Reconfiguration in Computer Networks // ACM Transactions on Internet Technology. 2018. . 18. 3. . 27. https://doi.org/10.1145/3093898 // https://elibrary.ru/item.asp?id=43288530 (Q2, WoS and Scopus).
  6. Igor Kotenko, Andrey Fedorchenko, Elena Doynikova, Andrey Chechulin. An Ontology-based Hybrid Storage of Security Information // Information Technology and Control. 2018. . 47. 4. . 655-667 DOI: 10.5755/j01.itc.47.4.20007 // https://elibrary.ru/item.asp?id=37282133
  7. Igor Kotenko. Guest Editorial: Managing Insider Security Threats // Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), Vol. 9, No. 1, March 2018. P.1-3. DOI: 10.22667/JOWUA.2018.03.31.001 // https://elibrary.ru/item.asp?id=35483397 (Q3, Scopus).
  8. Maxim Kolomeets, Andrey Chechulin, Igor Kotenko, Yannick Chevalier. A visual analytics approach for the cyber forensics based on different views of the network traffic // Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 2018, Vol. 9, No. 2, P. 57-73. (Q3, Scopus) // https://elibrary.ru/item.asp?id=38663593
  9. Igor Kotenko, Igor Parashchuk. Synthesis of controlled parameters of cyber-physical-social systems for monitoring of security incidents in conditions of uncertainty // : Journal of Physics: Conference Series. 3. . "3rd Annual International Conference on Information System and Artificial Intelligence, ISAI 2018" 2018. . 012153. DOI: 10.1088/1742-6596/1069/1/012153 // https://www.elibrary.ru/item.asp?id=35734637
  10. Gustavo Gonzalez-Granadillo, Joaquin Garcia-Alfaro, Igor Kotenko, Elena Doynikova. Hypergraph-driven Mitigation of Cyber-Attacks // Internet Technology Letters. John Wiley & Sons, Ltd., 2018. Volume1, Issue1, May/June 2018. 6 p. https://doi.org/10.1002/itl2.38 (WoS).
  11. Igor Kotenko, Igor Saenko, Sergey Ageev. Fuzzy Adaptive Routing in Multi-Service Computer Networks under Cyber Attack Implementation // Advances in Intelligent Systems and Computing. 2018. . 679. . 215-225. DOI: 10.1007/978-3-319-68321-8_22 // https://elibrary.ru/item.asp?id=31083207
  12. Gustavo Gonzalez-Granadillo, Elena Doynikova, Igor Kotenko, Joaquin Garcia-Alfaro. Attack Graph-based Countermeasure Selection using a Stateful Return on Investment Metric // Lecture Notes in Computer Science. 2018. . 10723 LNCS. . 293-302. DOI: 10.1007/978-3-319-75650-9_19 // https://elibrary.ru/item.asp?id=35490864
  13. Igor Kotenko, Igor Saenko. Evolutionary Algorithms for Design of Virtual Private Networks // Studies in Computational Intelligence. 2018. . 798. . 287-297. DOI: 10.1007/978-3-319-99626-4_25 // https://www.elibrary.ru/item.asp?id=35751038
  14. Igor Kotenko, Igor Saenko, Alexander Branitskiy. Applying Big Data Processing and Machine Learning Methods for Mobile Internet of Things Security Monitoring // Journal of Internet Services and Information Security. 2018. . 8. 3. . 54-63. // https://elibrary.ru/item.asp?id=41290334
  15. Igor Kotenko, Elena Doynikova. Selection of countermeasures against network attacks based on dynamical calculation of security metrics // Journal of Defence Modeling and Simulation, 2018. Vol. 15. 2. P.181-204. DOI: 10.1177/1548512917690278. https://doi.org/10.1177/1548512917690278 // https://elibrary.ru/item.asp?id=35489635
  16. E. Doynikova, I. Kotenko. Approach for determination of cyber-attack goals based on the ontology of security metrics // IOP Conference Series Materials Science and Engineering 450(5):052006, November 2018, DOI:10.1088/1757-899X/450/5/052006, https://doi.org/10.1088/1757-899X/450/5/052006.
  17. Andrey Chechulin, Maxim Kolomeec, Igor Kotenko. Visual analytics for improving efficiency of network forensics: account theft investigation // : Journal of Physics: Conference Series. 3. . "3rd Annual International Conference on Information System and Artificial Intelligence, ISAI 2018" 2018. . 012062. DOI: 10.1088/1742-6596/1069/1/012062. (Q3, WoS and Scopus) // https://www.elibrary.ru/item.asp?id=35737385
  18. Igor Kotenko, Andrey Chechulin, Mikhail Bulgakov. Intelligent Security Analysis of Railway Transport Infrastructure Components on the base of Analytical Modeling // Advances in Intelligent Systems and Computing. 2018. . 680. . 178-188. DOI: 10.1007/978-3-319-68324-9_20 // https://elibrary.ru/item.asp?id=31113435 (WoS and Scopus).
  19. Elena Doynikova Igor Kotenko. The multi-layer graph based technique for proactive automatic response against cyber attacks // Proceedings of the 26th Euromicro International Conference on Parallel, Distributed and network-based Processing (PDP 2018). Cambridge, UK, March 21-23, 2018. Los Alamitos, California. IEEE Computer Society. 2018. P.470-477. DOI: 10.1109/PDP2018.2018.00081 // https://elibrary.ru/item.asp?id=35728921
  20. Igor Kotenko, Andrey Fedorchenko, Igor Saenko, Alexey Kushnerevich. Parallelization of security event correlation based on accounting of event type links // Proceedings of the 26th Euromicro International Conference on Parallel, Distributed and network-based Processing (PDP 2018). Cambridge, UK, March 21-23, 2018. Los Alamitos, California. IEEE Computer Society. 2018. P.462-469. DOI: 10.1109/PDP2018.2018.00080 // https://elibrary.ru/item.asp?id=35751811 (WoS and Scopus).
  21. Maxim Kolomeec, Andrey Chechulin, Igor Kotenko. Visual analysis of CAN bus traffic injection using radial bar charts // Proceedings - 2018 IEEE Industrial Cyber-Physical Systems, ICPS 2018. 1. 2018. . 841-846. DOI: 10.1109/ICPHYS.2018.8390816, https://ieeexplore.ieee.org/abstract/document/8390816/ (WoS and Scopus) // https://elibrary.ru/item.asp?id=35768985
  22. Dmitry Levshun, Andrey Chechulin, Igor Kotenko. A Technique for Design of Secure Data Transfer Environment: Application for I2C Protocol // Proceedings - 2018 IEEE Industrial Cyber-Physical Systems, ICPS 2018. 1. 2018. . 789-794. DOI: 10.1109/ICPHYS.2018.8390807. https://ieeexplore.ieee.org/document/8390807 // https://elibrary.ru/item.asp?id=35757740
  23. Vasily Desnitsky, Igor Kotenko. Security event analysis in XBee-based wireless mesh networks // : Proceedings of the 2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering, ElConRus 2018. 2018. . 42-44. DOI: 10.1109/EIConRus.2018.8317025 // https://elibrary.ru/item.asp?id=35749402
  24. Igor Kotenko, Igor Parashchuk. Formation of indicators for assessing technical reliability of information security systems // : 2018 International Russian Automation Conference, RusAutoCon 2018. 2018. . 8501650. https://ieeexplore.ieee.org/document/8501650, DOI: 10.1109/RUSAUTOCON.2018.8501650 // https://www.elibrary.ru/item.asp?id=38615194
  25. Igor Saenko, Igor Kotenko. Genetic Algorithms for Role Mining in Critical Infrastructure Data Spaces // : GECCO 2018 Companion - Proceedings of the 2018 Genetic and Evolutionary Computation Conference Companion. 2018. . 1688-1695. // https://elibrary.ru/item.asp?id=35723654 (WoS and Scopus).
  26. Igor Kotenko, Igor Saenko, Oleg Lauta. Analytical modeling and assessment of cyber resilience on the base of stochastic networks conversion (invited paper) // : Proceedings of 2018 10th International Workshop on Resilient Networks Design and Modeling, RNDM 2018. 10. 2018. . 8489830. DOI: 10.1109/RNDM.2018.8489830 // https://elibrary.ru/item.asp?id=38638411
  27. Iuliia Kim, Anastasiia Matveeva, Ilya Viksnin, Igor Kotenko. Image clustering method based on particle swarm optimization // : Annals of Computer Science and Information Systems. Proceedings of the 2018 Federated Conference on Computer Science and Information Systems, FedCSIS 2018. 2018. . 535-544. DOI: 10.15439/2018F206 // https://elibrary.ru/item.asp?id=38611180 (WoS and Scopus)
  28. Elena Doynikova, Andrey Fedorchenko, Igor Kotenko. Determination of security threat classes on the basis of vulnerability analysis for automated countermeasure selection // ACM International Conference Proceeding Series. 13. . "ARES 2018 - 13th International Conference on Availability, Reliability and Security" (ARES 2018). Hamburg, Germany, August 27-30, 2018 . 3233260 DOI: 10.1145/3230833.3233260 // https://elibrary.ru/item.asp?id=38644965
  29. Igor Kotenko, Igor Saenko, Andrey Chechulin, Vasily Desnitsky, Lidia Vitkova, Anton Pronoza. Monitoring and counteraction to malicious influences in the information space of social networks // : 10th International Conference on Social Informatics (SocInfo). 2018. . 159-167. DOI: 10.1007/978-3-030-01159-8_15 // https://elibrary.ru/item.asp?id=35677138
  30. Vasily Desnitsky, Igor Kotenko, Nikolay Rudavin. Ensuring Availability of Wireless Mesh Networks for Crisis Management // Studies in Computational Intelligence. 2018. . 798. . 344-353. DOI: 10.1007/978-3-319-99626-4_30 // https://elibrary.ru/item.asp?id=35751016
  31. Igor Kotenko, Sergey Ageev, Igor Saenko. Implementation of Intelligent Agents for Network Traffic and Security Risk Analysis in Cyber-Physical Systems // : ACM International Conference Proceeding Series. Proceedings - SIN 2018: 11th International Conference on Security of Information and Networks. 2018. . a22. DOI: 10.1145/3264437.3264487 // https://elibrary.ru/item.asp?id=38638961 (Scopus, WoS)
  32. Alexander Branitskiy, Igor Kotenko. Software Tool for Testing the Packet Analyzer of Network Attack Detection Systems // ACM International Conference Proceeding Series. Proceedings - SIN 2018: 11th International Conference on Security of Information and Networks (SIN 2018). September 10th-12th, 2018 - Cardiff University, Cardiff P. a12- a20 DOI: 10.1145/3264437.3264488 // https://elibrary.ru/item.asp?id=38638966 (Scopus, WoS)
  33. Igor Kotenko, Igor B. Parashchuk, Turganbek Omar. Neuro-fuzzy models in tasks of intelligent data processing for detection and counteraction of inappropriate, dubious and harmful information // 2nd International Scientific-Practical Conference Fuzzy Technologies in the Industry (FTI 2018), October 23-25, 2018, Ulyanovsk, Russia. P.116-125 // https://elibrary.ru/item.asp?id=37534870
  34. Elena Doynikova, Igor Kotenko. Approach for determination of cyber attack goals based on the ontology of security metrics // Proceedings of the International Workshop Advanced Technologies in Aerospace, Mechanical and Automation Engineering" (MIST: Aerospace-2018). October 20, 2018, Krasnoyarsk, Russia. IOP Conference Series: Materials Science and Engineering (MSE),IOP Publishing, Vol.450 5, . 052006-052013 https://doi.org/10.1088/1757-899X/450/5/052006.
  35. Dmitry Levshun, Yannick Chevalier, Igor Kotenko, Andrey Chechulin. Secure Communication in Cyber-Physical Systems // The 3rd International Symposium on Mobile Internet Security (MobiSec 2018). Cebu, Philippines, August 29-September 1, 2018. 9 p. http://isyou.info/conf/mobisec18/mobisec18-book-ver1.pdf.
  36. Maxim Kalameyets, Andrey Chechulin, Igor Kotenko. The technique of structuring social network graphs for visual analysis of user groups to counter inappropriate, dubious and harmful information // 2nd International Scientific-Practical Conference Fuzzy Technologies in the Industry (FTI 2018), October 23-25, 2018, Ulyanovsk, Russia, P.87-95 http://ceur-ws.org/Vol-2258/paper12.pdf // https://elibrary.ru/item.asp?id=37534866
  37. Merelli I., Lio P., Kotenko I. Message from organizing chairs // Proceedings - 26th Euromicro International Conference on Parallel, Distributed, and Network-Based Processing, PDP 2018. 26. 2018. . xxi. DOI: 10.1109/PDP2018.2018.00006 // https://elibrary.ru/item.asp?id=35741312
  38. Elena Doynikova, Igor Kotenko. Improvement of attack graphs for cybersecurity monitoring: handling of inaccuracies, processing of cycles, mapping of incidents and automatic countermeasure selection // SPIIRAS Proceedings. 2018. 2(57) P. 211 -240. DOI: 10.15622/sp.57.9 // https://elibrary.ru/item.asp?id=32761925 (in Russian).
  39. Igor Kotenko, Igor Saenko, Alexey Kushnerevich. Architecture of the Parallel Big Data Processing System for Security Monitoring of Internet of Things Networks // SPIIRAS Proceedings. 2018 4(59). P.5-30, DOI 10.15622/sp.59.1 // https://elibrary.ru/item.asp?id=35358989 (Scopus) (in Russian).
  40. Anton Pronoza, LidiaVitkova, Andrey Chechulin, Igor Kotenko, Dmitry Saharov. Methodology for disseminating information channels analysis in social networks // Vestnik of Saint-Petersburg University applied mathematics. Computer science. Control processes, 2018. Vol.14, 4, P.362-377 DOI: 10.21638/11702/spbu10.2018.409 // https://elibrary.ru/item.asp?id=36687364 (in Russian).
  41. Andrey Fedorchenko,Igor Kotenko. Correlation of Information in SIEM Systems based on Event Type Relation Graph // Information and Control Systems.2018. 1(92). P.58-67. https://doi.org/10.15217/issnl684-8853.2018.1.58 https://cyberleninka.ru/article/n/korrelyatsiya-informatsii-v-siem-sistemah-na-osnove-grafa-svyazey-tipov-sobytiy/viewer // https://elibrary.ru/item.asp?id=32538052 (in Russian).
  42. Vasily Desnitsky, Igor Kotenko. Analysis of Energy Resource Depletion Attacks on Wireless Devices // Journal of Instrument Engineering. 2018. Vol.61.No.4. P.291-297.DOI: 10.17586/0021-3454-2018-61-4-291-297 https://cyberleninka.ru/article/n/analiz-atak-istoscheniya-energoresursov-na-sistemy-besprovodnyh-ustroystv/viewer // https://www.elibrary.ru/item.asp?id=32836535 (in Russian).
  43. Maxim Kolomeec, Andrey Chechulin, Elena Doynikova, Igor Kotenko. A technique of visualization of cybersecurity metrics // Journal of Instrument Engineering. 2018. Vol.61.No.10.P.873-880. DOI: 10.17586/0021-3454-2018-61-10-873-880 https://cyberleninka.ru/article/n/metodika-vizualizatsii-metrik-kiberbezopasnosti // https://elibrary.ru/item.asp?id=36408681 (in Russian).
  44. Sergety Ageev, Igor Saenko, Igor Kotenko. Method and Algorithms of Anomaly Detection in Multiservice Network Traffic based on Fuzzy Logical Inference // Information and Control Systems.2018. No.3(94). P.61-68. https://doi.org/10.15217/issn1684-8853.2018.3.61 // https://elibrary.ru/item.asp?id=35097885 (in Russian).
  45. Igor Kotenko,Dmitry Levshun, Andrey Chechulin, Igor Ushakov, Andrey Krasov. An Integrated Approach to Provide Security of Cyber-Physical Systems Based on Microcontrollers // Cybersecurity issues.2018. No.3 (27) P.29 38. DOI: 10.21681/2311-3456-2018-3-29-38 // https://elibrary.ru/item.asp?id=36609968 (in Russian).
  46. Maxim Kolomeec, Igor Kotenko, Andrey Chechulin. Visual Analytics for Detecting Attacks in Vehicle`s CAN Bus Traffic // Information Security. Inside. 2018. No.3(81). P.51-57 // https://elibrary.ru/item.asp?id=35097115 (in Russian).
  47. Dmitry Levshun, Andrey Chechulin, Igor Kotenko. Design of Secure Data Transfer Environment Using the I2C Protocol as an Example // Information Security. Inside. 2018. No.4(82). P.54-62 // https://elibrary.ru/item.asp?id=35510042 (in Russian).
  48. Elena Doynikova, Andrey Fedorchenko, Igor Kotenko. Determination of Information System Weaknesses for Automated selection of security measures // Problems of information security. Computer systems. 2018. No.3. P.89-99. // https://elibrary.ru/item.asp?id=36576822 (in Russian).
  49. Vasily Desnitsky, Igor Kotenko, Nikolay Rudavin. An Approach to Ensuring Availability in Wireless Networks for risis Management // Scientific and analytical journal Bulletin of St. Petersburg University of the State Fire Service EMERCOM of Russia. 2018. No.3. P.92-96. // https://elibrary.ru/item.asp?id=36263688 (in Russian).
  50. I.V. Kotenko, I.B. Parashchuk. Automated adaptive monitoring of integrated security of information systems "smart city": target functions of the conceptual model // Bulletin of the Astrakhan State Technical University. Series Management, Computer Engineering and Informatics, 2018 No. 3, . 7-15. DOI: 10.24143/2072-9502-2018-3-7-15 https://www.elibrary.ru/download/elibrary_35216893_29342477.pdf // https://www.elibrary.ru/item.asp?id=35216893 (in Russian).
  51. Igor Parashchuk, Igor Kotenko. Target Functions of the Conceptual Model of Adaptive Monitoring of Integrated Security in the Interests of Counteracting the Socio-Cyber-Physical Threats to the Smart City// Mathematical methods in engineering and technology - MMTT. 2018. Vol. 2. pp. 139-144. // https://www.elibrary.ru/item.asp?id=36295775 (in Russian).
  52. I.V. Kotenko, A.A. Chechulin, D.S. Levshun Modeling of railway transport infrastructure security monitoring systems // Transport security and technologies-2018. No.1 - P. 62-64 https://www.securitymedia.ru/issue_transport_issue_0_58.html (in Russian).
  53. Nikolay Vasilishin, Igor Ushakov, Igor Kotenko. Research of the network traffic analysis algorithms using big data to detect computer attacks // Electronic journal "Alley of Science" 2018. Vol. 3. No. 6 (22). pp. 1012-1021. https://alley-science.ru/arhiv_nomerov/ // https://elibrary.ru/item.asp?id=35326749 (in Russian).
  54. Igor Parashchuk, Igor Kotenko. Neural network identification of the stochastic matrix elements for modeling of information security processes // International Conference on Soft Computing and Measurements. 2018. Vol. 1. pp. 728-731. // https://www.elibrary.ru/item.asp?id=35619917 (in Russian).
  55. Igor Parashchuk, Igor Kotenko. General architecture of intelligent system for analytical processing of digital network content in order to protect against unwanted information // Proceedings of the conference "Information technologies in management" (ITU-2018). St. Petersburg. October 2-4, 2018. SPb.: Concern Central Research Institute Electropribor JSC, 2018, P. 384-388. // https://www.elibrary.ru/item.asp?id=37028982 (in Russian).
  56. Igoe Kotenko, Igor Saenko. Common architecture of the intelligent system for analytical processing of digital network content with the purpose of detecting from undesirable information // Proceedings of the conference "Information technologies in management" (ITU-2018). St. Petersburg. October 2-4, 2018. SPb.: Concern Central Research Institute Electropribor JSC, 2018, P.482-487. // https://elibrary.ru/item.asp?id=37029002 (in Russian).
  57. Maxim Kolomeec, Igor Kotenko, Nikita Kosov, Sergey Ageev, Alexander Ivanov. Analysis of human-machine interaction methods in SIEM-systemsvisual analytics instruments // Proceedings of the conference "Information technologies in management" (ITU-2018). St. Petersburg. October 2-4, 2018. SPb.: Concern Central Research Institute Electropribor JSC, 2018, P. 559-562 // https://www.elibrary.ru/item.asp?id=37029016 (in Russian).
  58. Igor Kotenko, Maxim Kolomeec, Sergey Bushuev, Artem Gelfand. Data visualization for the identification and counteraction of undesirable information computer-human interaction techniques based on multitouch screens in security operation centers // Proceedings of the conference "Information technologies in management" (ITU-2018). St. Petersburg. October 2-4, 2018. SPb.: Concern Central Research Institute Electropribor JSC, 2018, P.554-558 // https://elibrary.ru/item.asp?id=37029015 (in Russian).
  59. Igor Parashchuk, Igor Kotenko, Igor Saenko, Andrey Chechulin. Key architectural decisions on creation of intelligent system of analytical processing of digital network content for the benefit of protection against inappropriate information // XVI Anniversary Saint-Petersburg International Conference "Regional informatics-2018 (RI-2018)". St. Petersburg, Russia. October 24-26, 2018. Proceedings. P. 151-152. http://www.spoisu.ru/files/ri/ri2018/ri2018_materials.pdf // https://elibrary.ru/item.asp?id=36349218 (in Russian).
  60. Igor Parashchuk, Elena Doynikova, Igor Kotenko. Approach to the development of requirements for elimination of incomplete and contradiction of estimation and categorization of sense filling of information objects // XVI Anniversary Saint-Petersburg International Conference "Regional informatics-2018 (RI-2018)". St. Petersburg, Russia. October 24-26, 2018. Proceedings. P. 162-164. http://www.spoisu.ru/files/ri/ri2018/ri2018_materials.pdf // https://elibrary.ru/item.asp?id=36336097 (in Russian).
  61. Igor Kotenko, Maxim Kolomeec, Vladimir Komashinskiy, Sergey Bushuev, Artem Gelfand. Computer-human interaction model on the basis of touch screens for monitoring of computer networks security // XVI Anniversary Saint-Petersburg International Conference "Regional informatics-2018 (RI-2018)". St. Petersburg, Russia. October 24-26, 2018. Proceedings. P. 149-150. http://www.spoisu.ru/files/ri/ri2018/ri2018_materials.pdf // https://elibrary.ru/item.asp?id=41400292 (in Russian).
  62. N.A. Komashinsky, I.V. Kotenko. Analysis of UEBA-system architectures // Regional Informatics (RI-2018). XVI St. Petersburg International Conference " Regional Informatics (RI-2018)". St. Petersburg, October 24-26, 2018: Materials of the conference. St. Petersburg: SPOISU. 2018. pp. 146-147. http://www.spoisu.ru/files/ri/ri2018/ri2018_materials.pdf // https://www.elibrary.ru/item.asp?id=46479579 (in Russian).
  63. Eugene Merkushev, Igor Kotenko. Usage of SAP HANA for big data security analytics // XVI Anniversary Saint-Petersburg International Conference "Regional informatics-2018 (RI-2018)". St. Petersburg, Russia. October 24-26, 2018. Proceedings. P. 156-157. http://www.spoisu.ru/files/ri/ri2018/ri2018_materials.pdf // https://elibrary.ru/item.asp?id=46479782 (in Russian).
  64. Eugene Merkushev, Igor Kotenko. Computation integrity mechanismcs in cloud environments // XVI Anniversary Saint-Petersburg International Conference "Regional informatics-2018 (RI-2018)". St. Petersburg, Russia. October 24-26, 2018. Proceedings. P. 158-159. http://www.spoisu.ru/files/ri/ri2018/ri2018_materials.pdf // https://elibrary.ru/item.asp?id=46479834 (in Russian).
  65. Igor Kotenko, Igor Saenko, Andrey Chechulin. Conceptual model of functioning of intelligent system of analytical processing of digital network content for the benefit of detection and counteraction of inappropriate, dubious and harmful information // XVI Anniversary Saint-Petersburg International Conference "Regional informatics-2018 (RI-2018)". St. Petersburg, Russia. October 24-26, 2018. Proceedings. P. 153-154. http://www.spoisu.ru/files/ri/ri2018/ri2018_materials.pdf // https://elibrary.ru/item.asp?id=41285896 (in Russian).
  66. Igor Kotenko. Cybersecurity analytics: analysis of the current state and perspective research directions // Actual problems of informational communication in science and education (PINO 2018). VII International technical science and methodical science conference. Compilation of papers. In 4 volumes. Edited by S.V. Bachevskiy. 2018. Vol.1, P. 10-19. https://www.sut.ru/doci/nauka/7apino/Sb_APINO%202018__1.pdf // https://elibrary.ru/item.asp?id=35231512 (in Russian).
  67. Elena Doynikova, Igor Kotenko. Techniques and tools of response to cyberattacks in the industrial Internet of Things // Actual problems of informational communication in science and education (PINO 2018). VII International technical science and methodical science conference. Compilation of papers. In 4 volumes. Edited by S.V. Bachevskiy. 2018. Volume 1. P. 23-28. https://www.sut.ru/doci/nauka/7apino/Sb_APINO%202018__1.pdf // https://www.elibrary.ru/item.asp?id=35231514 (in Russian).
  68. Maxim Kolomeec, Andrey Chechulin, Igor Kotenko. Computer-human interaction techniques for improving the effectiveness of decision-making processes in information security // Actual problems of informational communication in science and education (PINO 2018). VII International technical science and methodical science conference. Compilation of papers. In 4 volumes. Edited by S.V. Bachevskiy. 2018. Vol. 1. P. 479-483. https://www.sut.ru/doci/nauka/7apino/Sb_APINO%202018__1.pdf // https://elibrary.ru/item.asp?id=35231618 (in Russian).
  69. Nickolay Komashinsky, Igor Kotenko. Problems of detecting targeted attacks (apt) against critically important information systems // Actual problems of informational communication in science and education (PINO 2018). VII International technical science and methodical science conference. Compilation of papers. In 4 volumes. Edited by S.V. Bachevskiy. 2018. Vol. 1. P. 483-488. https://www.sut.ru/doci/nauka/7apino/Sb_APINO%202018__1.pdf // https://www.elibrary.ru/item.asp?id=35231619 (in Russian).
  70. Evgenii Merkushev, Igor Kotenko. Data and computation integrity mechanisms in cloud environments // Actual problems of informational communication in science and education (APISE 2018). VII International technical science and methodical science conference. Compilation of papers. In 4 volumes. Edited by S.V. Bachevskiy. 2018. Volume 1. P. 493-498. https://www.sut.ru/doci/nauka/7apino/Sb_APINO%202018__1.pdf // https://elibrary.ru/item.asp?id=35231621&pff=1 (in Russian).
  71. Igor Ushakov, Igor Kotenko. Models of NoSQL databases for cybersecurity monitoring // Actual problems of informational communication in science and education (PINO 2018). VII International technical science and methodical science conference. Compilation of papers. In 4 volumes. Edited by S.V. Bachevskiy. 2018. Volume 1. P. 498-501. https://www.sut.ru/doci/nauka/7apino/Sb_APINO%202018__1.pdf // https://elibrary.ru/item.asp?id=35231622&pff=1 (in Russian).
  72. Igor Kotenko, Igor Ushakov. Methods of searching insiders in computer networks based on big data technologies // Actual problems of informational communication in science and education (PINO 2018). VII International technical science and methodical science conference. Compilation of papers. In 4 volumes. Edited by S.V. Bachevskiy. 2018. Volume 1. P. 501-506. https://www.sut.ru/doci/nauka/7apino/Sb_APINO%202018__1.pdf // https://elibrary.ru/item.asp?id=35231623&pff=1 (in Russian).
  73. Igor Parashchuk, Igor Kotenko, Igor Saenko. Parameters of IT-infrastructure of the cyberphysical system in interest of security information and event management: the basic directions of selection // Promising directions of development of domestic information technologies: materials of the IV interregional scientific and practical conference. Sevastopol, September 18-22, 2018 P. 233-234 // https://www.elibrary.ru/item.asp?id=36570170 (in Russian).
  74. Vasily Desnitsky, Igor Kotenko Machine learning based detection of DENIAL-OF-SLEEP attacks in wireless sensor networks for crisis management // Proceedings of XXI International Conference on Soft Computing and Measurements (SCM-2018). Saint-Petersburg, Russia,May 23-25, 2018. Vol.1. P.431-433 // https://elibrary.ru/item.asp?id=35619840 (in Russian).

2017

  1. Vladimir Gorodetsky, Igor Kotenko, Viktor Skormin. Integrated Multi-Agent Approach to Network Security Assurance: Models of Agents' Community // Information Security for Global Information Infrastructures. IFIP Advances in Information and Communication Technology. 2017. . 47. . 291-300. DOI: 10.1007/978-0-387-35515-3_30 // https://elibrary.ru/item.asp?id=41628485
  2. Igor Saenko, Sergey Ageev and Igor Kotenko. Detection of traffic anomalies in multi-service networks based on a fuzzy logical inference // Studies in Computational Intelligence. 2017. . 678. . 79-88. DOI: 10.1007/978-3-319-48829-5_8 // https://elibrary.ru/item.asp?id=28239199
  3. Igor Saenko and Igor Kotenko. Reconfiguration of RBAC schemes by genetic algorithms // Studies in Computational Intelligence. 2017. . 678. . 89-98. DOI: 10.1007/978-3-319-48829-5_9 // https://elibrary.ru/item.asp?id=28220320
  4. Igor Kotenko, Andrey Chechulin, Dmitry Komashinsky. Categorisation of web pages for protection against inappropriate content in the internet. International Journal of Internet Protocol Technology (IJIPT), Vol. 10, No. 1, 2017. P.61-71. DOI: 10.1504/IJIPT.2017.083038 // https://www.elibrary.ru/item.asp?id=29485945
  5. Igor Kotenko, Andrey Chechulin, Alexander Branitskiy. Generation of Source Data for Experiments with Network Attack Detection Software // Journal of Physics: Conference Series. 2017. . 820. 1. . 012033. DOI: 10.1088/1742-6596/820/1/012033 // https://elibrary.ru/item.asp?id=29483273
  6. Igor Kotenko, Igor Saenko and Andrey Chechulin. Protection against information in eSociety: using Data Mining methods to counteract unwanted and malicious data // Communications in Computer and Information Science. 2017. . 745. . 170-184. DOI: 10.1007/978-3-319-69784-0_15 // https://elibrary.ru/item.asp?id=31040301 (WoS and Scopus)
  7. Alexander Branitskiy, Igor Kotenko. Hybridization of computational intelligence methods for attack detection in computer networks // Journal of Computational Science, Elsevier, 2017, Vol.23, P.145156. DOI: 10.1016/j.jocs.2016.07.010 // https://elibrary.ru/item.asp?id=41771295
  8. Alexander Branitskiy and Igor Kotenko. Network anomaly detection based on an ensemble of adaptive binary classifiers // Computer Network Security. Lecture Notes in Computer Science. 2017. . 10446 LNCS. . 143-157. DOI: 10.1007/978-3-319-65127-9_12 // https://elibrary.ru/item.asp?id=31110104
  9. Vasily Desnitsky and Igor Kotenko. Modeling and Analysis of IoT Energy Resource Exhaustion Attacks // Studies in Computational Intelligence - 11th International Symposium on Intelligent Distributed Computing (IDC'2017). Belgrade. Serbia, 11-13 october 2017. Vol.737 P. 263-270. DOI: 10.1007/978-3-319-66379-1_23 // https://elibrary.ru/item.asp?id=31113146
  10. Igor Kotenko, Igor Saenko, Alexey Kushnerevich. Parallel big data processing system for security monitoring in Internet of Things networks // Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), Vol.8, No.4 . 60-74 (December 2017). DOI: 10.22667/JOWUA.2017.12.31.060 // https://elibrary.ru/item.asp?id=35536738
  11. Igor Kotenko, Andrey Chechulin, Elena Doynikova, Andrey Fedorchenko. Ontological hybrid storage for security data // Studies in Computational Intelligence. 2017. . 737. . 159-171. DOI: 10.1007/978-3-319-66379-1_15 // https://elibrary.ru/item.asp?id=31065783
  12. Maxim Kolomeec, Gustavo Gonzalez-Granadillo, Elena Doynikova, Andrey Chechulin, Igor Kotenko, and Herve Debar. Choosing models for security metrics visualization // Lecture Notes in Computer Science. 2017. . 10446 LNCS. . 75-87. DOI: 10.1007/978-3-319-65127-9_7 // https://elibrary.ru/item.asp?id=31066510
  13. Andrey Fedorchenko, Igor Kotenko, Elena Doynikova, Andrey Chechulin. The ontological approach application for construction of the hybrid security repository // XX International Conference on Soft Computing and Measurements (SCM'2017), Saint-Petersburg, May 24-26, 2017 P.525-528. DOI: 10.1109/SCM.2017.7970638 // https://elibrary.ru/item.asp?id=31048917
  14. Dmitry Levshun, Andrey Chechulin, Igor Kotenko. Design Lifecycle for Secure Cyber-Physical Systems based on Embedded Devices // Proceedings of the 2017 IEEE 9th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, IDAACS 2017. 9. 2017. . 277-282. DOI: 10.1109/IDAACS.2017.8095090 // https://elibrary.ru/item.asp?id=35530497
  15. Elena Doynikova and Igor Kotenko. CVSS-based Probabilistic Risk Assessment for Cyber Situational Awareness and Countermeasure Selection // Proceedings - 2017 25th Euromicro International Conference on Parallel, Distributed and Network-Based Processing, PDP 2017. 25. 2017. . 346-353 DOI: 10.1109/PDP.2017.44 // https://elibrary.ru/item.asp?id=31045380
  16. Igor Saenko, Igor Kotenko, and Alexey Kushnerevich. Parallel processing of big heterogeneous data for security monitoring of iot networks // : Proceedings - 2017 25th Euromicro International Conference on Parallel, Distributed and Network-Based Processing, PDP 2017. 25. 2017. . 329-336. DOI: 10.1109/PDP.2017.45 // https://elibrary.ru/item.asp?id=31036173
  17. Elena Doynikova, Andrey Chechulin, and Igor Kotenko. Analytical Attack Modeling and Security Assessment based on the Common Vulnerability Scoring System // Conference of Open Innovation Association, FRUCT. Proceedings of the 20th Conference of Open Innovations Association, FRUCT 2017. 2017. . 53-61. DOI: 10.23919/FRUCT.2017.8071292 // https://elibrary.ru/item.asp?id=35517447
  18. Igor Saenko, Igor Kotenko. Administrating Role-Based Access Control by Genetic Algorithms // GECCO 2017 - Proceedings of the Genetic and Evolutionary Computation Conference Companion. 2017. . 1463-1470. DOI: 10.1145/3067695.3082509 // https://elibrary.ru/item.asp?id=31080315
  19. Igor Kotenko, Artem Kuleshov and Igor Ushakov. Aggregation of Elastic Stack Instruments for Collecting, Storing and Processing of Security Information and Events // 2017 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computed, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI). 2017. 234 DOI: 10.1109/UIC-ATC.2017.8397627 // https://elibrary.ru/item.asp?id=35285008
  20. Elena Doynikova and Igor Kotenko. Enhancement of Probabilistic Attack Graphs for Accurate Cyber Security Monitoring // 2017 IEEE SmartWorld Ubiquitous Intelligence and Computing, Advanced and Trusted Computed, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People and Smart City Innovation, SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2017 - Conference Proceedings. 2017. . 1-6. DOI: 10.1109/UIC-ATC.2017.8397618 // https://elibrary.ru/item.asp?id=35757909
  21. Andrey Fedorchenko, Igor Kotenko, and Didier El Baz. Correlation of security events based on the analysis of structures of event types // : Proceedings of the 2017 IEEE 9th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, IDAACS 2017. 9. 2017. . 270-276. DOI: 10.1109/IDAACS.2017.8095089 https://hal.laas.fr/hal-02115860/file/scan145632.pdf // https://elibrary.ru/item.asp?id=35539679
  22. Vasily Desnitsky, Igor Kotenko. Modeling and analysis of security incidents for mobile communication mesh ZigBee-based network // XX International Conference on Soft Computing and Measurements (SCM'2017). Saint-Petersburg, 2426 may 2017. P.500-502. DOI: 10.1109/SCM.2017.7970629 // https://elibrary.ru/item.asp?id=31032496
  23. Igor Kotenko, Igor Saenko, Sergey Ageev. Monitoring the State of Elements of Multi-service Communication Networks on the Basis of Fuzzy Logical Inference // The Sixth International Conference on Communications, Computation, Networks and Technologies (INNOV 2017). October 8 - 12, 2017. Athens, Greece. IARIA, 2017. P.26-32. ISBN: 978-1-61208-596-8. https://www.researchgate.net/publication/322244745_
  24. R. Yusupov, I. Kotenko. Message from organizing committee chairs // Proceedings - 2017 25th Euromicro International Conference on Parallel, Distributed and Network-Based Processing, PDP 2017. 25. 2017. . xv. DOI: 10.1109/PDP.2017.5 // https://elibrary.ru/item.asp?id=31028961
  25. Dmitry Levshun, Andrey Chechulin, Igor Kotenko. Design lifecycle for secure cyber-physical systems based on embedded devices. Information Security. Inside, 4(76), 2017. P.53-59. // https://elibrary.ru/item.asp?id=29966169 (in Russian).
  26. Maxim Kolomeec, Igor Kotenko, Andrey Chechulin. Using virtual and augmented reality for cyber security data visualization. Information Security. Inside, 5(77), 2017. P.58-63 // https://elibrary.ru/item.asp?id=30268269 (in Russian).
  27. Igor Kotenko, Andrey Chechulin, Dmitry Levshun. Security analysis of railway transport infrastructure on the base of analytical modeling. Information Security. Inside, 6(78), 2017. P.48-57. // https://elibrary.ru/item.asp?id=30585609 (in Russian).
  28. Igor Kotenko, Artem Kuleshov, Igor Ushakov. A system for collecting, storing and processing security information and events based on elastic stack tools // SPIIRAS Proceedings. No. 5 (54), 2017. P. 5-34. DOI: 10.15622/sp.54.1 // https://elibrary.ru/item.asp?id=30282018 (in Russian).
  29. Igor Kotenko, Igor Saenko, Mikhail Kotsynyak, Oleg Lauta. Assessment of cyber-resilience of computer networks based on simulation of cyber attacks by the stochastic networks conversion method // SPIIRAS Proceedings. No. 6 (55), 2017. P. 160-184. DOI: 10.15622/sp.55.7 // https://elibrary.ru/item.asp?id=30685505 (in Russian).
  30. Alexander Branitskiy, Igor Kotenko. Open source software for network attack detection and prevention. Part 1 // Information security. Inside. No. 2(47), 2017. P. 40-47. // https://elibrary.ru/item.asp?id=28846336 (in Russian).
  31. Alexander Branitskiy, Igor Kotenko. Open source software for network attack detection and prevention. Part 2 // Information security. Inside. No. 3(75), 2017. P. 58-66. // https://elibrary.ru/item.asp?id=29207619 (in Russian).
  32. Igor Kotenko, Igor Ushakov. Big data technologies for monitoring of computer security // Information security. Inside. 2017. No. 3(75), P. 23-33. // https://elibrary.ru/item.asp?id=29207615 (in Russian).
  33. Igor Kotenko, Vasily Desnitsky. ountering targeted cyber-physical attacks in distributed large-scale critical systems // Information Security. Inside, 2017, 4(76), P. 66-69. // https://elibrary.ru/item.asp?id=29966171 (in Russian).
  34. Elena Doynikova and Igor Kotenko. A multi-layer technique for proactive response against cyber attacks based on graph models // Information Security. Inside, 2017, No. 6(78). pp. 58-67 // https://www.elibrary.ru/item.asp?id=30585610 (in Russian).
  35. Elena Doynikova, Andrey Chechulin and Igor Kotenko. Computer network security evaluation based on CVSS metrics // Information and Control Systems, 2017, No. 6(91). pp. 76-87. DOI: 10.15217/issn1684-8853.2017.6.76 // https://elibrary.ru/item.asp?id=30794562 (in Russian).
  36. Igor Kotenko, Andrey Fedorchenko, Igor Saenko, and Alexei Kushnerevich. Big data technologies for security event correlation based on event type accounting // Cybersecurity issues. 2017. No. 5(24), . 2-16 DOI: 10.21681/2311-3456-2017-5-2-16 // https://elibrary.ru/item.asp?id=32360573 (in Russian).
  37. Igor Kotenko, Igor Saenko. SIEM-systems for monitoring and managing incidents. Transport safety and technology. 2017. 04(51) P. 96-97 (in Russian).
  38. Igor Kotenko, Igor Parashchuk. Analysis of tasks and potential directions for the development of modern methods and tools for ensuring the complex security of cyber-physical systems such as "Smart transport" // The journal "Scientific Review". 2017. No. 25. pp. 26-30. // https://www.elibrary.ru/item.asp?id=46552549 (in Russian).
  39. Andrey Fedorchenko, Igor Kotenko, Elena Doynikova, Andrey Chechulin. The ontological approach application for the construction of the hybrid security repository. XX International Conference on Soft Computing and Measurements (SCM'2017), Proceedings. Saint-Petersburg, ETU "LETI", 2017. Vol. 2, P.55-58. https://elibrary.ru/download/elibrary_29902198_57102181.pdf // https://elibrary.ru/item.asp?id=29902198 (in Russian).
  40. Vasily Desnitsky, Igor Kotenko. Modeling and analysis of security incidents for mobile communication mesh ZigBee-based network // XX International Conference on Soft Computing and Measurements (SCM'2017),Proceedings. Vol. 2, Saint-Petersburg, ETU "LETI", 2017. Vol. 2, P. 39-42. https://elibrary.ru/download/elibrary_29902194_82983224.pdf // https://elibrary.ru/item.asp?id=29902194 (in Russian).
  41. Igor Kotenko, Igor Parashchuk. To the question of integrated security of the "Smart City" and the problems of counteraction to socio-cyberphysical threats // World science: problems and innovations. Proceedings of XII international science-practical conference. Penza, 2017. P. 33-36. http://comsec.spb.ru/index.php?menu=papers&action=edit&id=1198 // https://www.elibrary.ru/item.asp?id=29885427 (in Russian).
  42. Vasily Desnitsky Desnitsky V.A., Kotenko I.V., Lauta O.S., Sayenko I.B. An approach to the cyber-resilience assessment on the basis of topological conversion of stochastic networks // VI International Conference on Advanced Info-Telecommunication (ICAIT 2017). 01-02 March 2017. Conference proceedings. St. Petersburg., 2017. Vol. 2. P.250-255.https://www.sut.ru/doci/nauka/6apino/apino2017-2.pdf // https://www.elibrary.ru/item.asp?id=32578164 (in Russian).
  43. I.B. Saenko, A.G. Kushnerevich, I.V. Kotenko, A.A. Chechulin. An approach to creation of program system of the distributed parallel processing of data bulks about security events on the computer network // VI International Conference on Advanced Info-Telecommunication (ICAIT 2017). March 1-2, 2017. Conference proceedings. Saint-Petersburg, 2017. Vol. 3 pp. 286-291 https://www.sut.ru/doci/nauka/6apino/apino2017-3.pdf // https://elibrary.ru/item.asp?id=32650689 (in Russian).
  44. Elena Doynikova and Igor Kotenko. Technique for the automatic assessment of secondary business assets security properties criticality in the service oriented architectures // International congress IS&IT International Conference on Artificial Intelligence and Systems. Proceedings. Divnomorskoye, Russia. September 2-9, 2017. Vol. 2. pp. 349-355. (in Russian).
  45. Andrey Chechulin, Andrey Kotenko. Modeling cyber-physical attacks and producing countermeasures in a mode near to real-time // International congress IS&IT International Conference on Artificial Intelligence and Systems. Proceedings. Divnomorskoye, Russia. September 2-9, 2017. Vol. 2. pp. 271-276. (in Russian).
  46. Elena Doynikova and Igor Kotenko. Models, technique and algorithms of the countermeasure selection based on the system of security metrics for the proactive and reactive response to attacks in computer networks // Regional informatics and information security. 2017. pp. 223-225. http://www.spoisu.ru/files/riib/riib_4_2017.pdf // https://www.elibrary.ru/item.asp?id=35276203 (in Russian).
  47. Andrey Fedorchenko and Igor Kotenko. Influence of data changes dynamics in the process of security events correlation // X St. Petersburg Interregional Conference "Information Security of the regions of Russia" (IBRR-2017). November 1-3, 2017.Proceedings. Issue 4. St. Petersburg: SPOISU P. 255-257 http://www.spoisu.ru/files/riib/riib_4_2017.pdf // https://elibrary.ru/item.asp?id=35276214 (in Russian).
  48. Igor Ushakov, Igor Kotenko. Model of Discovery an Inside Attacker Based on Big Data Technologies // X St. Petersburg Interregional Conference "Information Security of the regions of Russia" (IBRR-2017). November 1-3, 2017.Proceedings. Issue 4. St. Petersburg: SPOISU P. 253-254 http://www.spoisu.ru/files/riib/riib_4_2017.pdf // https://elibrary.ru/item.asp?id=35276212 (in Russian).
  49. Igor Ushakov, Igor Kotenko. Security Databases Fora Corporative Network: Implementing SQL and NoSQL Technologies // X St. Petersburg Interregional Conference "Information Security of the regions of Russia" (IBRR-2017). November 1-3, 2017.Proceedings. Issue 4. St. Petersburg: SPOISU P. 254-255 http://www.spoisu.ru/files/riib/riib_4_2017.pdf // https://elibrary.ru/item.asp?id=35276213 (in Russian).
  50. Anton Pronoza, Ekaterina , Andrey Chechulin, Igor Kotenko. Automatic detection of difference between the interests of social network users of depending on their cognitive functions // X St. Petersburg Interregional Conference "Information Security of the regions of Russia" (IBRR-2017). November 1-3, 2017.Proceedings. Issue 4. St. Petersburg: SPOISU P. 261-263. http://www.spoisu.ru/files/riib/riib_4_2017.pdf // https://elibrary.ru/item.asp?id=35276217 (in Russian).
  51. Andrey Fedorchenko, Alexei Kushnerevich, Igor Saenko, and Igor Kotenko. An approach for processing big data for security monitoring the distributed situational centers // The All-Russian Forum "The System of Distributed Situation Centers as the Basis for Digital Transformation of Public Administration" (SDSC-2017). 2017. . 201-202 (in Russian).
  52. Andrey Fedorchenko, Elena Doynikova, Igor Kotenko, and Andrey Chechulin. Analysis of security events properties for correlation process for siem-systems // The All-Russian Forum "The System of Distributed Situation Centers as the Basis for Digital Transformation of Public Administration" (SDSC-2017). 2017. . 199-201 (in Russian).
  53. Eugene Merkushev, Igor Kotenko. Confidentiality mechanisms of of information in cloud systems of distributed situational centers. The All-Russian Forum "The System of Distributed Situation Centers as the Basis for Digital Transformation of Public Administration" (SDSC-2017). 2017. . 183-184 (in Russian).
  54. Elena Doynikova, Igor Kotenko, and Andrey Fedorchenko. System of incident response for security information and events monitoring. The All-Russian Forum "The System of Distributed Situation Centers as the Basis for Digital Transformation of Public Administration" (SDSC-2017). 2017. . 148-150 (in Russian).
  55. Nikolay Komashinsky, Igor Kotenko. The Neural Network Analysis Subsystem of Computer Attacks to Protect the Cloud Platform in Data Centers // The All-Russian Forum "The System of Distributed Situation Centers as the Basis for Digital Transformation of Public Administration" (SDSC-2017). 2017. . 168-170 (in Russian).
  56. Eugene Merkushev, Igor Kotenko. The mechanisms for ensuring the availability of cloud services for distributed situational centers // The All-Russian Forum "The System of Distributed Situation Centers as the Basis for Digital Transformation of Public Administration" (SDSC-2017). 2017. . . 183-184 (in Russian).
  57. Igor Ushakov, Igor Kotenko. The Database Model of the Security Systems of Distributed Situation Centers for Big Data Processing. The All-Russian Forum "The System of Distributed Situation Centers as the Basis for Digital Transformation of Public Administration" (SDSC-2017). 2017. . . 198-199 (in Russian).
  58. Igor Kotenko, Igor Parashchuk, Igor Saenko. Information security of cyberphysical systems: the basic directions of research // Perspective directions of development of native information technologies: materials of the III Interregional scientific-practical conference "Perspective directions of development of native information technologies". Sevastopol, September 19-23, 2017 P. 63-65. // https://elibrary.ru/item.asp?id=34962124 (in Russian).

2016

  1. Dmitry Novozhilov, Igor Kotenko and Andrey Chechulin. Improving the Categorization of Web Sites by Analysis of Html-Tags Statistics to Block Inappropriate Content // Studies in Computational Intelligence. 2016. . 616. . 257-263. DOI: 10.1007/978-3-319-25017-5_24 // https://elibrary.ru/item.asp?id=24934708
  2. Maxim Kolomeec, Andrey Chechulin, Anton Pronoza, and Igor Kotenko. Technique of Data Visualization: Example of Network Topology Display for Security Monitoring // Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications. 2016. . 7. 1. . 58-78. http://isyou.info/jowua/papers/jowua-v7n1-4.pdf DOI: 10.22667/JOWUA.2016.03.31.058 // https://elibrary.ru/item.asp?id=27150813
  3. Vasily Desnitsky, Dmitry Levshun, Andrey Chechulin and Igor Kotenko. Design Technique for Secure Embedded Devices: Application for Creation of Integrated Cyber-Physical Security System// Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), June, 2016 Vol.7, No.2, P.60-80. http://isyou.info/jowua/papers/jowua-v7n2-4.pdf DOI: 10.22667/JOWUA.2016.06.31.060 // https://elibrary.ru/item.asp?id=27036091
  4. Igor Kotenko, Dmitry Levshun, Andrey Chechulin. Event correlation in the integrated cyber-physical security system // The 2016 XIX IEEE International Conference on Soft Computing and Measurements (SCM-2016), IEEE, St. Petersburg, Russia, May 2016 P.484-486. DOI: 10.1109/SCM.2016.7519820 // https://elibrary.ru/item.asp?id=27589708
  5. MaximKolomeets, AndreyChechulin, Igor Kotenko. Visualization Model for Monitoring of Computer Networks Security Based on the Analogue of Voronoi Diagrams // Lecture Notes in Computer Science. 2016. . 9817. . 141-157. DOI: 10.1007/978-3-319-45507-5_10 // https://elibrary.ru/item.asp?id=27569647
  6. Vasily Desnitsky and Igor Kotenko. Automated design, verification and testing of secure systems with embedded devices based on elicitation of expert knowledge // Journal of Ambient Intelligence and Humanized Computing (AHIC), Springer. October 2016, Volume 7, Issue 5, P.705719. DOI 10.1007/s12652-016-0371-6. http://link.springer.com/article/10.1007/s12652-016-0371-6 // https://www.elibrary.ru/item.asp?id=27575769 (WoS and Scopus)
  7. Igor Saenko, Fadey Skorik, Igor Kotenko. Application of Hybrid Neural Networks for Monitoring and Forecasting Computer Networks States // Lecture Notes in Computer Science. 2016. . 9719. . 521-530. DOI: 10.1007/978-3-319-40663-3_60 // https://elibrary.ru/item.asp?id=27076462 (WoS and Scopus)
  8. Igor Kotenko. Guest Editorial: advances in secure Distributed and Network-Based Computing // Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), Vol. 7, No. 2, June 2016. P.1-2. // https://elibrary.ru/item.asp?id=27036194 (Scopus)
  9. Elena Doynikova, Igor Kotenko. Countermeasure selection based on the attack and service dependency graphs for security incident management // Lecture Notes in Computer Science. 2016. . 9572. . 107-124. DOI: 10.1007/978-3-319-31811-0_7 // https://elibrary.ru/item.asp?id=27047170
  10. Elena Doynikova, Igor Kotenko. Techniques and Software Tool for Risk Assessment on the Base of Attack Graphs in Information and Security Event Management Systems // Saint-Petersburg Institute for Informatics and Automation of the RAS. 2016. 5. P. 56-67. DOI:10.15217/issn1684-8853.2016.5.54
  11. Vasily Desnitsky, Andrey Chechulin, Igor Kotenko, Dmitry Levshun, Maxim Kolomeec. Application of a Technique for Secure Embedded Device Design Based on Combining Security Components for Creation of a Perimeter Protection System // 24th Euromicro International Conference on Parallel, Distributed, and Network-Based Processing (PDP 2016). Heraklion, Crete,2016 February 17-19. IEEE Computer Society P.609-616. DOI: 10.1109/PDP.2016.99 // https://elibrary.ru/item.asp?id=27160200
  12. Igor Kotenko, Elena Doynikova. Dynamical calculation of security metrics for countermeasure selection in computer networks // Proceedings - 24th Euromicro International Conference on Parallel, Distributed, and Network-Based Processing, PDP 2016. 24. 2016. . 558-565. DOI: 10.1109/PDP.2016.96 // https://elibrary.ru/item.asp?id=27160210
  13. Igor Kotenko, Igor Saenko. An Approach to Aggregation of Security Events in Internet-of-Things Networks Based on Genetic Optimization // : Proceedings - 13th IEEE International Conference on Ubiquitous Intelligence and Computing, 13th IEEE International Conference on Advanced and Trusted Computing, 16th IEEE International Conference on Scalable Computing and Communications, IEEE International Conference on Cloud and Big Data Computing, IEEE International Conference on Internet of People and IEEE Smart World Congress and Workshops, UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld 2016. 13. 2016. . 657-664. DOI: 10.1109/UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld.2016.0109 // https://elibrary.ru/item.asp?id=29483970
  14. Vasily Desnitsky, Igor Kotenko. Event analysis for security incident management on a perimeter access control system // XIX International Conference on Soft Computing and Measurements (SCM'2016), Saint Petersburg, 2527 may 2016 P.481-483. DOI: 10.1109/SCM.2016.7519819 // https://elibrary.ru/item.asp?id=27586770
  15. Igor Saenko and Igor Kotenko. Using Genetic Algorithms for Design and Reconfiguration of RBAC Schemes // : ACM International Conference Proceeding Series. 1. . "PrAISe 2016 - 1st International Workshop on Artificial Intelligence for Privacy and Security, Held at EUMAS 2016" 2016. . 2970033. DOI: 10.1145/2970030.2970033 // https://elibrary.ru/item.asp?id=27570214
  16. Elena Doynikova, Igor Kotenko. Security assessment based on attack graphs and open standards for computer networks with mobile components // The 2016 International Symposium on Mobile Internet Security (MobiSec16). Taichung, Taiwan. July 14-15, 2016. 11 p. http://docs.wixstatic.com/ugd/a6c9b6_602321846ab246958450c7513f9c5692.pdf
  17. Igor Saenko, Oleg Lauta, Igor Kotenko. Analytical modeling of mobile banking attacks based on a stochastic network conversion technique // The 2016 International Symposium on Mobile Internet Security (MobiSec16). Taichung, Taiwan. July 14-15, 2016. 10 p. https://www.researchgate.net/publication/312021348_Analytical_modeling_of_mobile_banking_attacks_based_on_a_stochastic_network_conversion_technique
  18. Anton Pronoza, Andrey Chechulin, Igor Kotenko. Mathematical Models of Visualization in SIEM Systems // SPIIRAS Proceedings. 2016. Issue 3(46). P.90-107. DOI: 10.15622/sp.46.8 https://elibrary.ru/download/elibrary_26498850_30177438.pdf // https://elibrary.ru/item.asp?id=26498850 (in Russian).
  19. Andrey Fedorchenko, Dmitry Levshun, Andrey Chechulin, Igor Kotenko. An Analysis of Security Event Correlation Techniques in Siem-Systems. Part 1. SPIIRAS Proceedings. 2016. Issue 4(47). P.5-27. DOI: 10.15622/sp.47.1 http://ia.spcras.ru/index.php/sp/article/view/3366/1950 // https://elibrary.ru/item.asp?id=26498862 (in Russian).
  20. Maxim Kolomeec, Andrey Chechulin, Igor Kotenko. Technique of visualization of computer network topology for monitoring of information security // PJournal of Instrument Engineering. Vol.59, 10, 2016. P.807-812. DOI 10.17586/0021-3454-2016-59-10-807-812 // https://elibrary.ru/item.asp?id=27170903 (in Russian).
  21. Vasily Desnitsky, Andrey Chechulin, Igor Kotenko, Dmitry Levshun, Maxim Kolomeec. Combined Design Technique for Secure Embedded Devices Exemplified by a Perimeter Protection System // SPIIRAS Proceedings. 2016. Issue 48. P.5-31. DOI: 10.15622/sp.48.1 // https://elibrary.ru/item.asp?id=27177922 (in Russian).
  22. Andrey Fedorchenko, Dmitry Levshun, Andrey Chechulin, Igor Kotenko. An Analysis of Security Event Correlation Techniques in Siem-Systems. Part 2 // SPIIRAS Proceedings. 2016. Issue 6(49). P.5-27. DOI: 10.15622/sp.49.11 // https://elibrary.ru/item.asp?id=27657130 (in Russian).
  23. Dmitry Novozhilov, Andrey Chechulin, Igor Kotenko. Improving website categorization based on HTML tag statistics for blocking unwanted content // Management-information systems, 2016. No 6(85), P.65-73. DOI: 10.15217/issn1684-8853.2016.6.65 // https://elibrary.ru/item.asp?id=27536576 (in Russian).
  24. Igor Saenko, Fadey Skorik and Igor Kotenko. Monitoring and forecasting computer network state based on the use of hybrid neural networks // Journal of Instrument Engineering. Vol.59, 10, 2016. P.795-800. DOI: 10.17586/0021-3454-2016-59-10-795-800 // https://elibrary.ru/item.asp?id=27170901 (in Russian).
  25. Igor Saenko, Oleg Lauta and Igor Kotenko. Application of stochastic networks conversion technique for simulation of mobile banking attacks // Journal of Instrument Engineering. 2016. Vol.59, 11, P.928-933. (RISC, Scopus) DOI: 10.17586/0021-3454-2016-59-11-928-933 // https://elibrary.ru/item.asp?id=27371874 (in Russian).
  26. Alexander Branitskiy, Igor Kotenko. Analysis and Classification of Methods for Network Attack Detection // SPIIRAS Proceedings. 2016. Issue 2(45). P.207-244. DOI: 10.15622/SP.45.13 // https://elibrary.ru/item.asp?id=25920723 (in Russian).
  27. Evgenia Novikova, Igor Kotenko. Detection of anomalous activity in mobile money transfer services using RADViz-visualization // SPIIRAS Proceedings. 2016. Issue 48. P.32-51. DOI: 10.15622/sp.48.2 // https://elibrary.ru/item.asp?id=27177923 (in Russian).
  28. Evgenia Novikova, Igor Kotenko, Eugene Fedotov. Visual data analysis for anomalies detection in mobile money transfer services // Information Security. Inside, 2016, 4(70), P.40-47 https://elibrary.ru/item.asp?id=27035153 (in Russian).
  29. Elena Doynikova, Igor Kotenko. Techniques and software tool for risk assessment on the base of attack graphs in information and security event management systems // Information and Control Systems, 2016, 5(84), P.54-65. ISSN 1684-8853.2016. DOI: 10.15217/issn1684-8853.2016.5.54 // https://elibrary.ru/item.asp?id=27219304 (in Russian).
  30. Igor Saenko, Aleksey Kushnerevich, Igor Kotenko and Yan Kopchak. Program framework of the distributed parallel stream data processing for security monitoring in Internet-of-things networks // Mathematical methods in engineering and technology - MMTT. 2016. No. 4 (86). pp. 90-93. // https://www.elibrary.ru/item.asp?id=28385037 (in Russian).
  31. Igor Saenko, Igor Kotenko and Sergey Kruglov. Approach to the solution of a role mining problem when forming the RBAC model on the basis of genetic algorithms // Methods and technical means of ensuring information security. 2016. 25. P.113. // https://www.elibrary.ru/item.asp?id=36546804 (in Russian).
  32. Igor Saenko, Aleksey Kushnerevich, Igor Kotenko and Yan Kopchak. Approach to implementation of parallel stream data handling for security monitoring of the Internet of Things network // Methods and technical means of ensuring information security. 2016. No. 25. pp. 38-40. // https://elibrary.ru/item.asp?id=36546751 (in Russian).
  33. Andrey Chechulin, Maxim Kolomeec, Igor Kotenko, Sergey Busuev. Architecture of software prototype of heterogeneous data visualization system // Mathematical methods in engineering and technology - MMTT. 2016. No. 8 (90). pp. 142-144 // https://www.elibrary.ru/item.asp?id=28417712 (in Russian).
  34. Dmitry Levshun, Andrey Chechulin, Igor Kotenko. Architecture of integrated security system // Journal "Methods and technical means of information security" No. 25. pp.53-54. // https://elibrary.ru/item.asp?id=36546762 (in Russian).
  35. Evgenia Novikova, Igor Kotenko, Eugene Fedotov. Visual data analysis for anomalies detection in mobile money transfer services // Information Security. Inside, 2016, 5(71), P.72-82. // https://elibrary.ru/item.asp?id=27035199 (in Russian).
  36. Igor Kotenko, Dmitry Levshun, Andrey Chechulin, Sergey Bushuev. Event correlation in the integrated cyber-physical security system. XIX International Conference on Soft Computing and Measurements (SCM'2016),Proceedings. Vol. 2, Saint-Petersburg, ETU "LETI". P.327-331. // https://elibrary.ru/item.asp?id=27187695 (in Russian).
  37. Maxim Kolomeec, Igor Kotenko, Andrey Chechulin. Visualization model for cybersecurity monitoring system based on analogue of Voronoi diagrams // 15th National Conference on Artificial Intelligence with International Participation (CAI 2016). October, 3-7, 2016. Smolensk, Russia. Proceedings of the conference. P.180-187. // https://elibrary.ru/item.asp?id=27307887 (in Russian).
  38. Dmitry Levshun, Andrey Chechulin, Igor Kotenko. Secure inter-controller interaction based on I2C protocol // XV nniversary Saint-Petersburg International Conference "Regional informatics-2016 (RI-2016)". Proceedings. St. Petersburg, 2016. P.169-170. http://www.spoisu.ru/files/ri/ri2016/ri2016_materials.pdf // https://elibrary.ru/item.asp?id=29348476 (in Russian).
  39. Vasily Desnitsky, Igor Kotenko, Yan Kopchak. Analysis of events for management of security incidents on the example of access control system // International Conference on Soft Computing and Measurements. 2016. Vol. 2. pp. 332-336. https://www.elibrary.ru/download/elibrary_27187696_81386086.pdf // https://elibrary.ru/item.asp?id=27187696 (in Russian).
  40. Alexander Branitskiy, Igor Kotenko. Techniques of combining the binary classifiers for identifying the anomalous network connections // 9th Conference on Information Technologies in Control (ITC) . Proceedings. St.Petersburg, Russia. October 46, 2016. P.660-664. // https://elibrary.ru/item.asp?id=27559692 (in Russian).
  41. Elena Doynikova, Igor Kotenko. Technique for the security assessment of computer networks on the base of attack graphs and service dependency graphs // Information technologies in management (ITU-2016). Materials of the 9th Conference on Management Problems. P. 688-699 // https://www.elibrary.ru/item.asp?id=27559699 (in Russian).
  42. Elena Doynikova, Igor Kotenko. Technique for countermeasure selection to response on security incidents in computer networks on the base of security metrics // 9th Conference on Information Technologies in Control (ITC) . Proceedings. St.Petersburg, Russia. October 46, 2016. P.700-705. // https://elibrary.ru/item.asp?id=27559700 (in Russian).
  43. Nikolay Vasilishin, Igor Ushakov, Igor Kotenko. Research of the network traffic analysis algorithms using big data to detect computer attacks // 9th Conference on Information Technologies in Control (ITC) . Proceedings. St.Petersburg, Russia. October 46, 2016. P.670-675.// https://elibrary.ru/item.asp?id=27559695&pff=1 (in Russian).
  44. Igor Saenko and Igor Kotenko. Genetic algorithms for Boolean matrix factorization in relation to access control problems in computer networks // 15th National Conference on Artificial Intelligence with International Participation (CAI 2016). October, 3-7, 2016. Smolensk, Russia. Proceedings of the conference. Vol.3, P.98-106. // https://elibrary.ru/item.asp?id=27307851 (in Russian).
  45. Andrey Fedorchenko, Igor Kotenko. Techniques of security events correlation for target attacks detecting // 18th Conference RusCrypto on Cryptology, Steganography, Digital Signature and Security Systems. Solnechnogorsk, Russia. March 22-25, 2016. http://www.ruscrypto.ru/ (in Russian).
  46. Igor Saenko, Igor Kotenko and Sergey Kruglov. Genetic approach to reconfiguring of diagrams of role access in the common information space // International congress "IS&IT'16" - International Conference on Artificial Intelligence and Systems. Proceedings. Divnomorskoye, Russia. September 4-11. Taganrog, UFY, 2016. Vol.1. P.13-18. (in Russian).
  47. Elena Doynikova, Igor Kotenko. Technique and software tool for the countermeasure selection in computer networks on the base of the dynamical recalculation of security metrics // International congress "IS&IT'16" - International Conference on Artificial Intelligence and Systems. Proceedings. Divnomorskoye, Russia. September 4-11. Taganrog, UFY, 2015. Vol. 2. P.271-276. (in Russian).
  48. Nickolay Komashinsky, Igor Kotenko. Analysis of the approaches for the detection of the targeted attacks. XV nniversary Saint-Petersburg International Conference "Regional informatics-2016 (RI-2016)". Proceedings. St. Petersburg, 2016. P.167-168. http://www.spoisu.ru/files/ri/ri2016/ri2016_materials.pdf // https://www.elibrary.ru/item.asp?id=35091064 (in Russian).
  49. Igor Kotenko, Igor Ushakov. Using big data technologies to monitor information security incidents // XV nniversary Saint-Petersburg International Conference "Regional informatics-2016 (RI-2016)". Proceedings. St. Petersburg, 2016. .168-169. http://www.spoisu.ru/files/ri/ri2016/ri2016_materials.pdf // https://elibrary.ru/item.asp?id=35091250&pff=1 (in Russian).
  50. Eugene Merkushev, Igor Kotenko. Analysis of properties of cloud computing security ecosystem // Anniversary XV St. Petersburg International Conference " Regional Informatics-2016 (RI-2016)" St. Petersburg, October 26-28, 2016. P.179-180. http://www.spoisu.ru/files/ri/ri2016/ri2016_materials.pdf // https://elibrary.ru/item.asp?id=46489050&pff=1 (in Russian).
  51. Anton Pronoza, Igor Kotenko. Actual problems of big data visualization in security information and event management systems // Anniversary XV St. Petersburg International Conference " Regional Informatics-2016 (RI-2016)" St. Petersburg, October 26-28, 2016. P.189-190. http://www.spoisu.ru/files/ri/ri2016/ri2016_materials.pdf // https://elibrary.ru/item.asp?id=35091174&pff=1 (in Russian).
  52. Anton Pronoza, Igor Kotenko. Analysis of big data visualization models to solve the problem of monitoring large-scale computing networks //Anniversary XV St. Petersburg International Conference " Regional Informatics-2016 (RI-2016)" St. Petersburg, October 26-28, 2016 . P.188-189. http://www.spoisu.ru/files/ri/ri2016/ri2016_materials.pdf // https://elibrary.ru/item.asp?id=35091260&pff=1 (in Russian).
  53. Igor Saenko and Igor Kotenko. Models and methods of visual analysis of schemes and policies of access control to the resources of the common information space // Anniversary XV St. Petersburg International Conference " Regional Informatics-2016 (RI-2016)" St. Petersburg, October 26-28, 2016 . P.192-193. http://www.spoisu.ru/files/ri/ri2016/ri2016_materials.pdf // https://www.elibrary.ru/item.asp?id=35091275 (in Russian).
  54. I.B. Saenko, A.G. Kushnerevich, I.V. Kotenko. Implementation of a distributed parallel computing platform for collecting and preprocessing big monitoring data in cyber-physical systems // In the collection: International Congress on Informatics: Information Systems and Technologies. materials of the International Scientific Congress. S. V. Ablameyko (editor-in-chief). 2016. pp. 641-645. // https://elibrary.ru/item.asp?id=28354963 (in Russian).

2015

  1. Andrey Fedorchenko, Igor Kotenko and Andrey Chechulin. Design of integrated vulnerabilities database for computer networks security analysis. 23th Euromicro International Conference on Parallel, Distributed, and Network-Based Processing (PDP 2015). Turku, Finland, March, 2015. P.559-566. DOI: 10.1109/PDP.2015.38 // https://elibrary.ru/item.asp?id=26999070
  2. Igor Kotenko, Andrey Fedorchenko and Andrey Chechulin. Integrated repository of security information for network security evaluation // Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications. 2015. . 6. 2. . 41-57. href="http://jowua.yolasite.com/vol6no2.php">http://jowua.yolasite.com/vol6no2.php (Scopus) eLIBRARY ID: 23989252 (in Russian).
  3. Maxim Kolomeec, Andrey Chechulin and Igor Kotenko. Methodological Primitives for Phased Construction of Data Visualization Models. Journal of Internet Services and Information Security (JISIS), Vol.5, No.4, November, 2015. P.60-84. http://www.jisis.org/vol5no4.php // https://elibrary.ru/item.asp?id=28865195
  4. Andrey Chechulin, Igor Kotenko. Attack Tree-based Approach for Real-Time Security Event Processing //Automatic Control and Computer Sciences. 2015. Vol. 49. 8. P. 701-704. DOI: 10.3103/S0146411615080052 // https://elibrary.ru/item.asp?id=27137320
  5. Vasily Desnitsky, Igor Kotenko, Sergey Nogin. Detection of Anomalies in Data for Monitoring of Security Components in the Internet of Things // Proceedings of International Conference on Soft Computing and Measurements, SCM 2015. 18. 2015. P. 189-192. DOI: 10.1109/SCM.2015.7190452 // https://elibrary.ru/item.asp?id=26956584
  6. Vasily Desnitsky, Igor Kotenko. Design and Verification of Protected Systems with Integrated Devices Based on Expert Knowledge // Automatic Control and Computer Sciences. 2015. Vol. 49. 8. . 648-652. DOI: 10.3103/S0146411615080246 // https://elibrary.ru/item.asp?id=27137072
  7. Igor Kotenko, Igor Saenko. Improved genetic algorithms for solving the optimisation tasks for design of access control schemes in computer networks // International Journal of Bio-Inspired Computation, Inderscience Enterprises Ltd., Vol. 7, No. 2, 2015, P.98-110. DOI: 10.1504/IJBIC.2015.069291 // https://elibrary.ru/item.asp?id=24031824 (Scopus)
  8. Igor Kotenko, Igor Saenko. Reconfiguration of access schemes in virtual networks of the internet of things by genetic algorithms // Studies in Computational Intelligence. 2016. . 616. . 155-165. DOI: 10.1007/978-3-319-25017-5_15 // https://elibrary.ru/item.asp?id=24934717
  9. Igor Kotenko, Igor Saenko, Fadey Skorik, Sergey Bushuev. Neural network approach to forecast the state of the internet of things elements. : Proceedings of International Conference on Soft Computing and Measurements, SCM 2015. 18. 2015. . 133-135. DOI: 10.1109/SCM.2015.7190434 // https://elibrary.ru/item.asp?id=26956184 (Scopus)
  10. Igor Kotenko, Igor Saenko, Sergey Ageev. Security Risks Management in the Internet of Things based on Fuzzy Logic Inference. The 2015 IEEE International Symposium on Recent Advances of Trust, Security and Privacy in Computing and Communications (RATSP 2015) in conjunction with The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15). Helsinki, Finland. 20-22 August 2015. Los Alamitos, California. IEEE Computer Society. 2015. P.654-659. (Scopus)
  11. A. Fedorchenko, I. Kotenko, A. Chechulin. Integrated repository of security information for network security evaluation // Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications. 2015. . 6. 2. . 41-57. // https://elibrary.ru/item.asp?id=23989252
  12. I. Kotenko. Guest editorial: security in distributed and network-based computing // Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications. 2015. Vol. 6. 2. P. 1-3 // https://elibrary.ru/item.asp?id=23989377
  13. Igor Kotenko, Andrey Chechulin, Dmitry Komashinsky. Evaluation of Text Classification Techniques for Inappropriate Web Content Blocking // The IEEE 8th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS'2015). Proceedings. Warsaw, Poland, September 24-26, 2015. P.412-417. DOI: 10.1109/IDAACS.2015.7340769 // https://www.elibrary.ru/item.asp?id=26955270 (Scopus)
  14. Igor Kotenko, Elena Doynikova. Countermeasure selection in SIEM systems based on the integrated complex of security metrics // Proceedings - 23rd Euromicro International Conference on Parallel, Distributed, and Network-Based Processing, PDP 2015. 23. 2015. . 567-574. DOI: 10.1109/PDP.2015.34 // https://elibrary.ru/item.asp?id=26998252
  15. Igor Kotenko, Elena Doynikova. The CAPEC based generator of attack scenarios for network security evaluation // Proceedings of the 2015 IEEE 8th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, IDAACS 2015. 8, Technology and Applications. 2015. . 436-441. DOI: 10.1109/IDAACS.2015.7340774 // https://elibrary.ru/item.asp?id=26954706
  16. Alexander Branitskiy, Igor Kotenko. Network attack detection based on combination of neural, immune and neuro-fuzzy classifiers // Proceedings - IEEE 18th International Conference on Computational Science and Engineering, CSE 2015. 18. 2015. . 152-159. DOI: 10.1109/CSE.2015.26 // https://elibrary.ru/item.asp?id=26997880 (WoS, Scopus)
  17. Igor Kotenko, Igor Saenko, Sergey Ageev, Yan Kopchak. Abnormal Traffic Detection in networks of the Internet of things based on fuzzy logical inference. XVIII International Conference on Soft Computing and Measurements (SCM'2015). IEEE Xplore, 2015. P.5-8. DOI: 10.1109/SCM.2015.7190394. // https://elibrary.ru/item.asp?id=26955939 (Scopus)
  18. Igor Kotenko, Igor Saenko. The Genetic Approach for Design of Virtual Private Networks // Proceedings - IEEE 18th International Conference on Computational Science and Engineering, CSE 2015. 18. 2015. . 168-175. DOI: 10.1109/CSE.2015.23 // https://elibrary.ru/item.asp?id=26998325
  19. I. Kotenko, I. Saenko, S. Ageev. Countermeasure security risks management in the internet of things based on fuzzy logic inference // : Proceedings - 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2015. 14. 2015. . 654-659. DOI: 10.1109/Trustcom.2015.431 // https://elibrary.ru/item.asp?id=27153712
  20. Y. Bekeneva, K. Borisenko, A. Shorov, I. Kotenko. Investigation of ddos attacks by hybrid simulation // Lecture Notes in Computer Science. 2015. . 9357. . 179-189. DOI: 10.1007/978-3-319-24315-3_18 // https://elibrary.ru/item.asp?id=26926703
  21. Igor Kotenko, Igor Saenko, Andrey Chechulin. Development of new generation of security information and event management systems // Methods and technical means of ensuring information security. 2015. No. 24. pp. 123-124. // https://www.elibrary.ru/item.asp?id=36546656 (in Russian).
  22. Igor Kotenko, Andrey Chechulin, Dmitry Komashinsky. Automated categorization of web-sites for inappropriate content blocking. Problems of information security. Computer systems. 2, 2015. P.62-68. // https://www.elibrary.ru/item.asp?id=24115356 (in Russian).
  23. Maxim Kolomeec, Andrey Chechulin, Igor Kotenko. Review of Methodological Primitives for the Phased Construction of Data Visualization Model .SPIIRAS Proceedings. 2015. 5 (42), P.232-257 // https://elibrary.ru/item.asp?id=24277967 (in Russian).
  24. Igor Kotenko, Evgenia Novikova, Andrey Chechulin. Visualization of security metrics for security monitoring and event management. Problems of information security. Computer systems. 4, 2015. P.42-47. // https://elibrary.ru/item.asp?id=25817956 (in Russian).
  25. Elena Doynikova, Igor Kotenko, Andrey Chechulin. Dynamic security assessment of computer networks in siem-systems // Information Technology Security, Vol. 22 3, 2015. P.33-42. // https://elibrary.ru/item.asp?id=25284632 (in Russian).
  26. Igor Kotenko, Elena Doynikova. Methods of selecting countermeasures on the basis of an integrated system of indicators of security in systems of information management and security events // Information management systems, 3, 2015. P.60-69. DOI: 10.15217/issn1684-8853.2015.3.60 // https://elibrary.ru/item.asp?id=23693738 (in Russian).
  27. Elena Doynikova, Igor Kotenko. Countermeasure selection for the management of the computer networks security on the base of the integrated system of security metrics // Methods and technical means of ensuring information security. 2015. No. 24. pp. 114-115. // https://www.elibrary.ru/item.asp?id=36546652 (in Russian).
  28. Andrey Fedorchenko, Igor Kotenko, Andrey Chechulin. Development of Information Access and Management Services for Integrated Vulnerability Database // Security of Information Technologies 2015. Vol. 22. No. 4. pp. 21-27. // https://elibrary.ru/item.asp?id=27704651 (in Russian).
  29. Alexander Branitskiy, Igor Kotenko. Construction of neural network and immune cell intrusion detection system. Problems of information security, Computer systems, 4, 2015. P.23-27. // https://elibrary.ru/item.asp?id=25817953 (in Russian).
  30. Alexander Branitskiy, Igor Kotenko. Network attack detection based on combination of neural, immune and neuro-fuzzy classifiers. Information management systems, 4(77), 2015. P.69-77 // https://elibrary.ru/item.asp?id=24113108 (in Russian).
  31. Alexander Branitskiy, Igor Kotenko. Methods of combining the binary classifiers for problems of detection and classification of network attacks // Methods and technical means of ensuring information security. 2015. No. 24. p. 68. // https://elibrary.ru/item.asp?id=36546624 (in Russian).
  32. Vasily Desnitsky, Igor Kotenko. Formation of the expertise to develop secure systems with embedded devices. Problems of information security, Computer systems, 2015. 4, P.35-41.// https://elibrary.ru/item.asp?id=25817955 (in Russian).
  33. Igor Saenko, Igor Kotenko. Using genetic optimization and visual analysis tools for access schema design in virtual local area networks. Information technology and computer systems, 1, 2015. P.33-46.// https://elibrary.ru/item.asp?id=24842568 (in Russian).
  34. Igor Kotenko, Igor Saenko, Sergey Ageev, Yan Kopchak. Detection of anomalous traffic in the networks of the Internet of Things, based on fuzzy logical deduction // International Conference on Soft Computing and Measurements. 2015. Vol. 1. pp. 9-14. // https://elibrary.ru/item.asp?id=23578885 (in Russian).
  35. Igor Kotenko, Igor Saenko, Fadey Skorik, Sergey Bushuev. Neural network approach to forecast the state of the internet of things elements. XVIII International Conference on Soft Computing and Measurements (SCM'2015),Proceedings. Vol. 1, Saint-Petersburg, ETU "LETI", 2015. P.395-399. // https://elibrary.ru/item.asp?id=23579019 (in Russian).
  36. Igor Saenko, Valery Kuvayev, Maxim Biryukov. The general architecture of the common access control system for diverse resources in uniform information and communication space // Technical sciences - from theory to practice. 2015. No. 52. pp. 70-75. // https://elibrary.ru/item.asp?id=25026434 (in Russian).
  37. Igor Saenko, Igor Kotenko. Adaptive change of policies and schemes of of access control to the resources of an unified information space // Methods and technical means of ensuring information security. 2015. No. 24. pp. 127-128. // https://www.elibrary.ru/item.asp?id=36546659 (in Russian).
  38. I.M. Novikov, I.V. Kotenko. Definition of functional logic of web applications based on network traffic data // Methods and technical means of ensuring information security. 2015. No. 24. pp. 91-92.// https://elibrary.ru/item.asp?id=36546637 (in Russian).
  39. Nikita Dubrovin, Igor Ushakov, Igor Kotenko. Implementation of a Hadoop based prototype to analyze big data. IX Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2015)", Saint-Petersburg, October 28-30, 2015. The proceedings of conference, 2015. P.69-70. // https://elibrary.ru/item.asp?id=35090621 (in Russian).
  40. Igor Saenko, Igor Kotenko. Models and methods for evaluating the effectiveness of a system of access control differentiation to resources of the information space. IX Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2015)", Saint-Petersburg, October 28-30, 2015. The proceedings of conference, 2015. P.85-75. // https://www.elibrary.ru/item.asp?id=35088149 (in Russian).
  41. Maxim Kolomeec, Andrey Chechulin, Igor Kotenko. Visualization of security settings of computer networks using a Voronov's diagram. IX Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2015)", Saint-Petersburg, October 28-30, 2015. The proceedings of conference, 2015. P.73-74. // https://elibrary.ru/item.asp?id=29348616 (in Russian).
  42. Doynikova E. V., Kotenko I. V. Analysis and application of security metrics in the SIEM-systems on the base of attack graphs and dependency graphs services // Regional Informatics and information security proceedings. St. Petersburg Society of computer science, computer engineering, communication systems and management. 2015. C. 104-112. // https://www.elibrary.ru/item.asp?id=28311640 (in Russian).
  43. Evgeniya Deshevyh, Igor Ushakov, Igor Kotenko. An overview of tools and platforms for processing big data for information security monitoring tasks // IX Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2015)", Saint-Petersburg, October 28-30, 2015. The proceedings of conference, 2015. P.67. // https://elibrary.ru/item.asp?id=35090688 (in Russian).
  44. Krylov Konstantin, Igor Ushakov, Igor Kotenko. Analysis of techniques of application the big data concept for monitoring computer network security. IX Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2015)", Saint-Petersburg, October 28-30, 2015. The proceedings of conference, 2015. P.75-76. // https://elibrary.ru/item.asp?id=35090855 (in Russian).
  45. Dmitry Levshun, Andrey Chechulin, Maxim Kolomeec, Igor Kotenko. An architecture of access management system to a room on the base of contactless smart cards. IX Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2015)", Saint-Petersburg, October 28-30, 2015. The proceedings of conference, 2015. P.76. // https://elibrary.ru/item.asp?id=29348371 (in Russian).
  46. Vasily Desnitsky, Igor Kotenko, Sergey Nogin. Detection of anomalies in data for monitoring of security components in the internet of things. XVIII International Conference on Soft Computing and Measurements (SCM'2015),Proceedings. Vol. 2, Saint-Petersburg, ETU "LETI", 2015. P.17-22.// https://elibrary.ru/item.asp?id=25016045 (in Russian).
  47. Igor Kotenko, Igor Saenko. The genetic approach to designing a virtual private network in secure information space. International congress "IS&IT15" - International Conference on Artificial Intelligence and Systems. Proceedings. Divnomorskoye, Russia. September 2-9, 2015. Mosow, Fizmathlit, 2015. Vol. 2. P.320-325. (in Russian).
  48. I.V. Kotenko, A.V. Sharov. Investigation of the mechanisms of protection of computer networks from infrastructure attacks based on the approach "nervous system of the network" // Problems of information security. Computer systems. 2015. No. 3. pp. 45-55. // https://elibrary.ru/item.asp?id=24115369 (in Russian).

2014

  1. Igor Kotenko, Andrey Shorov, Andrey Chechulin, Evgenia Novikova. Dynamical Attack Simulation for Security Information and Event Management // Lecture Notes in Geoinformation and Cartography. 2014. 199699. . 219-234. DOI: 10.1007/978-3-642-31833-7_14 // https://elibrary.ru/item.asp?id=30986943
  2. Igor Kotenko, Olga Polubelova, Igor Saenko. Logical Inference Framework for Security Management in Geographical Information Systems // Lecture Notes in Geoinformation and Cartography. 2014. 199699. . 203-218. DOI: 10.1007/978-3-642-31833-7_13 // https://elibrary.ru/item.asp?id=31127063
  3. Igor Kotenko, Igor Saenko. A Genetic Approach for Virtual Computer Network Design // Studies in Computational Intelligence. 2015. . 570. . 95-105. DOI: 10.1007/978-3-319-10422-5_11 // https://elibrary.ru/item.asp?id=23966401
  4. Vasily Desnitsky, Igor Kotenko. Expert Knowledge based Design and Verification of Secure Systems with Embedded Devices // Lecture Notes in Computer Science. 2014. . 8708. . 194-210. DOI: 10.1007/978-3-319-10975-6_15 // https://elibrary.ru/item.asp?id=41765429
  5. Igor Kotenko, Elena Doynikova. Evaluation of Computer Network Security based on Attack Graphs and Security Event Processing // Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), Vol.5, No.3, September 2014. P.14-29 //https://elibrary.ru/item.asp?id=23989639
  6. Andrey Shorov, Igor Kotenko. The framework for simulation of bioinspired security mechanisms against network infrastructure attacks // The Scientific World Journal. 2014. . 2014. . 172583. DOI: 10.1155/2014/172583 // https://elibrary.ru/item.asp?id=24047080
  7. Igor Kotenko, Andrey Chechulin. Fast Network Attack Modeling and Security Evaluation based on Attack Graphs // Journal of Cyber Security and Mobility, Vol.3, No.1, 2014. P.2746. DOI: 10.13052/jcsm2245-1439.312 // https://elibrary.ru/item.asp?id=28953942
  8. Igor Kotenko, Andrey Chechulin, Andrey Shorov, Dmitry Komashinsky. Analysis and Evaluation of Web Pages Classification Techniques for Inappropriate Content Blocking // Lecture Notes in Computer Science. 2014. . 8557 LNAI. . 39-54. DOI: 10.1007/978-3-319-08976-8_4 // https://www.elibrary.ru/item.asp?id=41762947
  9. Igor Kotenko, Elena Doynikova. Security Assessment of Computer Networks based on Attack Graphs and Security Events // Lecture Notes in Computer Science. 2014. . 8407 LNCS. . 462-471. DOI: 10.1007/978-3-642-55032-4_47 // https://elibrary.ru/item.asp?id=41766110
  10. Novikova E., Kotenko I., Fedotov E. Interactive multi-view visualization for fraud detection in mobile money transfer services // International Journal of Mobile Computing and Multimedia Communications. 2014. Vol. 6. 4. P. 73-97. DOI: 10.4018/IJMCMC.2014100105 // https://elibrary.ru/item.asp?id=27137197
  11. Igor Kotenko, Elena Doynikova and Andrey Chechulin. Security metrics based on attack graphs for the Olympic Games scenario // Proceedings - 2014 22nd Euromicro International Conference on Parallel, Distributed, and Network-Based Processing, PDP 2014. 2014. . 561-568. DOI: 10.1109/PDP.2014.113 // https://elibrary.ru/item.asp?id=21873723
  12. Philipp Nesteruk, Lesya Nesteruk, Igor Kotenko. Creation of a Fuzzy Knowledge Base for Adaptive Security Systems // Proceedings of the 22th Euromicro International Conference on Parallel, Distributed and network-based Processing (PDP 2014). Turin, Italy. 12th - 14th February, 2014. Los Alamitos, California. IEEE Computer Society. 2014. P.574-577. (WoS, Scopus) DOI: 10.1109/PDP.2014.115 // https://elibrary.ru/item.asp?id=21873658
  13. Igor Kotenko, Elena Doynikova. Security Evaluation for Cyber Situational Awareness // Proceedings - 16th IEEE International Conference on High Performance Computing and Communications, HPCC 2014, 11th IEEE International Conference on Embedded Software and Systems, ICESS 2014 and 6th International Symposium on Cyberspace Safety and Security, CSS 2014. 16. 2014. . 1197-1204. DOI: 10.1109/HPCC.2014.196 // https://elibrary.ru/item.asp?id=24064097
  14. Igor Kotenko, Igor Saenko, Andrey Chechulin. Proactive management of security information and events in the information and telecommunication systems // Radio electronics issues. 2014. Vol. 3. No. 1. pp. 170-180. // https://elibrary.ru/item.asp?id=21314643 (in Russian).
  15. Andrey Chechulin, Igor Kotenko, Vasily Desnitsky. Features of the information security systems design in cyber-physical systems // Methods and technical means of ensuring information security. 2014. No. 23. pp. 67-69. https://www.elibrary.ru/item.asp?id=36467256 (in Russian).
  16. Andrey Fedorchenko, Andrey Chechulin, Igor Kotenko. Open vulnerability bases and their application in security analysis systems of computer networks // Management-information systems, 2014, 5(72), P.72-79. // https://elibrary.ru/item.asp?id=22479528 (in Russian).
  17. Andrey Chechulin, Igor Kotenko. Attack Graph Construction for Security Events Analysis // Security of Information Technologie. 2014. Vol. 21. No. 3. pp. 135-141. // https://elibrary.ru/item.asp?id=23396058 (in Russian).
  18. Andrey Chechulin, Igor Kotenko. Real-time security events processing using an approach based on the attack trees analysis. Problems of information security. Computer systems. 2014. 3, P.56-59.// https://elibrary.ru/item.asp?id=22508074 (in Russian).
  19. Andrey Fedorchenko, Andrey Chechulin, Igor Kotenko. Analytical overview of open vulnerabilities databases. Problems of information security. Computer systems. 3, 2014. P.131-135. // https://elibrary.ru/item.asp?id=22508083 (in Russian).
  20. E.V. Doynikova, I.V. Kotenko. Analysis of the current situation and support for decision-making on the security of a computer network based on a system of security indicators // News of higher educational institutions. Instrumentation. 2014. vol. 57. No. 11. pp. 72-77. // https://elibrary.ru/item.asp?id=22502742 (in Russian).
  21. Igor Kotenko, Igor Saenko. The proposals about ontological representation and hybrid data storage for security events in the automated control system of railway transport // Technical science - from theory to practice, 29, 2013. Novosibirsk, SibAK, 2013. P.28-32 // https://elibrary.ru/item.asp?id=21046302 (in Russian).
  22. Igor Kotenko, Igor Saenko. Proposals on the logical inference implementation for cyber security management in the automated control system of railway transport // Natural and mathematical sciences in the modern world. 2014. No. 14. pp. 46-50.// https://www.elibrary.ru/item.asp?id=21063776 (in Russian).
  23. Igor Kotenko, Elena Doynikova. Calculation and analysis of security metrics based on attack graphs and service dependencies. Problems of information security. Computer systems, 2, 2014. P.19-36. // https://elibrary.ru/item.asp?id=21946385 (in Russian).
  24. Igor Kotenko, Igor Saenko, Rafael Yusupov. New generation of the security incidents monitoring and management systems // Nauchno-tekhnicheskie vedomosti SPbGPU. Informatics. Telecommunications. Control. SPbGPU, 2014, 3 (198), P.7-18. // https://elibrary.ru/item.asp?id=21693375 (in Russian).
  25. Igor Kotenko, Igor Saenko. About an architecture of the multilevel intelligent information security system for the automated systems of railway transport. 23th All-Russian Conference Methods and technical tools of information security (MTTIS 2014). Proceedings. St.Petersburg, Russia. 30 June - 03 July, 2014. P.97-98. // https://elibrary.ru/item.asp?id=36467272 (in Russian).
  26. Vasily Desnitsky, Igor Kotenko. Configuring information systems with embedded devices to provide complex security on railway transport // Methods and technical means of ensuring information security. 2014. No. 23. pp. 89-90. https://www.elibrary.ru/item.asp?id=36467267 (in Russian).
  27. Vasily Desnitsky, Igor Kotenko. Combined protection model of information and telecommunication systems of Internet of Things concept // Methods and technical means of ensuring information security. 2014. No. 23. pp. 65-66. // https://elibrary.ru/item.asp?id=36467254 (in Russian).
  28. A.V. Fedorchenko, A.A. Chechulin, I.V. Kotenko. Building an integrated vulnerability database // News of higher educational institutions. Instrumentation. 2014. Vol. 57. No. 11. pp. 62-67. // https://elibrary.ru/item.asp?id=22502740 (in Russian).
  29. Igor Kotenko, Igor Saenko. The technique for verification of security policies in the multilevel intelligent system of integrated protection of railway transport. Technical science - from theory to practice. 2014. 30. P.18-22 // https://elibrary.ru/item.asp?id=21112705 (in Russian).
  30. Igor Kotenko, Igor Saenko. About the tasks of cybersecurity in e-city infrastructures on the basis of artificial intelligence methods // Materials of the conference "Information Technologies in Management" (ITU-2014). 2014. pp. 618-622. ISBN 978-5-91995-042-4. // https://www.elibrary.ru/item.asp?id=22461599 (in Russian).
  31. Andrey Chechulin, Igor Kotenko. Application of Big Data processing methods for computer network infrastructure security // Materials of the conference "Information Technologies in Management" (ITU-2014). 2014. pp. 614-617. // https://elibrary.ru/item.asp?id=22461598 (in Russian).
  32. Andrey Fedorchenko, Andrey Chechulin, Igor Kotenko. Integrated vulnerabilities database for computer networks security evalution systems // Materials of the conference "Information Technologies in Management" (ITU-2014). 2014. pp. 638-341.// https://elibrary.ru/item.asp?id=22461602 (in Russian).
  33. Andrey Chechulin, Igor Kotenko. Design of the system for users protection against inappropriate content in the Internet. In the collection: Materials of the conference "Information Technologies in Management" (ITU-2014). 2014. pp. 642-647. // https://elibrary.ru/item.asp?id=22461603 (in Russian).
  34. Andrey Chechulin, Igor Kotenko. Software prototype of analytical attacks modeling component for security information and events management systems. XIV Saint-Petersburg International Conference Regional informatics-2014 (RI-2014). Proceedings. St. Petersburg, 2014. .170-171. (in Russian).
  35. I. Kotenko, A. Shorov. Simulation of bio-inspired security mechanisms against network infrastructure attacks // Studies in Computational Intelligence. 2015. . 570. . 127-133. DOI: 10.1007/978-3-319-10422-5_14 // https://elibrary.ru/item.asp?id=23967089
  36. Igor Kotenko, Evgenia Novikova. Visualization of Security Metrics for Cyber Situation Awareness // The 1st International Software Assurance Workshop (SAW 2014). In conjunction with the 9th International Conference on Availability, Reliability and Security (ARES 2014). September 8nd 12th, 2014. Fribourg, Switzerland. IEEE Computer Society. 2014. P.506-513. DOI: 10.1109/ARES.2014.75 // https://elibrary.ru/item.asp?id=24029278
  37. Evgenia Novikova, Igor Kotenko. Visual Analytics for Detecting Anomalous Activity in Mobile Money Transfer Services // Lecture Notes in Computer Science. 2014. . 8708. . 63-78. DOI: 10.1007/978-3-319-10975-6_5 // https://elibrary.ru/item.asp?id=41765459
  38. Igor Saenko, Igor Kotenko. Design of Virtual Local Area Network Scheme based on Genetic Optimization and Visual Analysis // Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), Vol.5, No.4, P.86-102, December 2014.// https://elibrary.ru/item.asp?id=24027045 (Scopus)
  39. Igor Kotenko, Igor Saenko. Creating New Generation Cybersecurity Monitoring and Management Systems // Herald of the Russian Academy of Sciences, 2014, Vol.84, No.6. ISSN 1019-3316. DOI: 10.1134/S1019331614060033 (Scopus IF=0.170, WoS)
  40. Vasily Desnitsky, Igor Kotenko. Expert knowledge based design and verification of secure systems with embedded devices // Problems of information security. Computer systems. 2014. 3, P.16-22. // https://elibrary.ru/item.asp?id=22508068 (in Russian).
  41. Igor Kotenko and Igor Saenko. Creating New-Generation Cybersecurity Monitoring and Management Systems. Herald of the Russian Academy of Sciences, Herald of the Russian Academy of Sciences. 2014. . 84. 6. . 424-431. DOI: 10.7868/S0869587314110073 // https://elibrary.ru/item.asp?id=22477914 (in Russian).
  42. Igor Kotenko, Elena Doynikova. Monitoring of the current security situation and security decisions support in the computer network on the base of the system of the security metrics . Journal of Instrument Engineering .57, 10, 2014. P.72-77. ISSN 0021-3454. (in Russian).
  43. Vasily Desnitsky, Igor Kotenko. The use of expert knowledge for development of secure systems with embedded devices Information // Technologies and Computing Systems, 2014. 4, P.58-73. // https://elibrary.ru/item.asp?id=22509438 (in Russian).
  44. Igor Kotenko, Evgenia Novikova. The models and techniques of a visual data analysis for task solution of the cyber security // 16th Conference RusCrypto on Cryptology, Steganography, Digital Signature and Security Systems. Solnechnogorsk, Russia. March 25-28, 2014. http://www.ruscrypto.ru/ (in Russian).
  45. Igor Kotenko, Igor Saenko. On the construction of an multilevel intelligent information security system for the automated systems of railway transport. Intelligent systems on the transport. IV International scientific-practical Conference IntellectTrans-2014. St. Petersburg,Proceedings. Petersburg State Communications University. 2014. P.21. (in Russian).
  46. Igor Kotenko, Igor Saenko. On the construction of a multilevel intelligent information security system for the automated systems of railway transport. IV International scientific-practical Conference IntellectTrans-2014. St. Petersburg,Proceedings. Petersburg State Communications University. 2014. P.196-203. (in Russian).
  47. Igor Kotenko, Rafael Yusupov. Cybersecurity monitoring and management systems of a new generation for information security in critical infrastructures. XVII All-Russian scientific-practical Conference "Actual security and protection problems". Saint-Petersburg, April 14, 2014. (in Russian).
  48. Igor Kotenko, Evgenia Novikova. Visual analytics guard of the information security. International Forum on practical security Positive Hack Days. Moscow. May 21-22, 2014. http://www.phdays.ru (in Russian).
  49. Igor Saenko, Igor Kotenko. Fundamentals of the construction of the perspective security monitoring and management systems for a protection of the critical information objects. International scientific-practical conference "Theoretical and practical information security problems". June 19, 2014. Minsk, Academy of the Ministry of Internal Affairs, Belarus Republic, 2014. (in Russian).
  50. Andrey Fedorchenko, Andrey Chechulin, Igor Kotenko. The integrated database of vulnerabilities. International Scientific and Practical Conference "Theoretical and applied problems of information security." June 19, 2014, Minsk, Academy of MIA Republic of Belarus, 2014. (in Russian).
  51. Igor Kotenko, Igor Saenko. A system of logical inference and verification of security policies in automated systems of railway transport. International congress IS&IT,14 - International Conference on Artificial Intelligence and Systems.Proceedings. Moskow, Fizmathlit. 2014. Vol.2. P.271-276. 978-5-9221-1572-8. (in Russian).
  52. Igor Saenko, Igor Kotenko. Genetic approach to virtual network design. International congress IS&IT,14 - International Conference on Artificial Intelligence and Systems.Proceedings. Moskow, Fizmathlit. 2014. Vol.2. P.35-40. ISBN 978-5-9221-1572-8. (in Russian).
  53. Igor Kotenko, Igor Saenko. Intelligent system for cyber security monitoring and incident management. 14-th national conference on artificial intelligence with international participation (KAI-2014), September 2427, 2014, Kazan, Russia. Proceedings, Vol.3. Kazan: Publ. RIC Scool, 2014. P.219-227. (in Russian).
  54. Vasily Desnitsky, Igor Kotenko. Conceptual combined model of embedded device protection system and its application to configuring components of multi-level intellectual system of complex security on railway transport. XIV Saint-Petersburg International Conference Regional informatics-2014 (RI-2014). Proceedings. St. Petersburg, 2014. P.131. (in Russian).
  55. Elena Doynikova, Igor Kotenko. Security assessment in the RR automated management systems // XIV Saint-Petersburg International Conference Regional informatics-2014 (RI-2014). Proceedings. St. Petersburg, 2014 . P.132-133. (in Russian).
  56. Igor Kotenko, Igor Saenko. Decision support on information security in the automated control systems of railway transport on the basis of the ontology data modelling. XIV Saint-Petersburg International Conference Regional informatics-2014 (RI-2014). Proceedings. St. Petersburg, 2014. P.144. (in Russian).
  57. Igor Kotenko, Igor Saenko. Models and methods for a visual analysis of Big Data and security events in the automated control systems of railway transport. XIV Saint-Petersburg International Conference Regional informatics-2014 (RI-2014). Proceedings. St. Petersburg, 2014. P.143. (in Russian).
  58. Igor Kotenko, Igor Saenko, Andrey Chechulin. Proactive management of information and security events in network NGN. Seminar of the International Telecommunication Union "Transition developing countries with existing networks to next generation network (NGN): technical, economic, legal and political aspects", St. Petersburg, St. Petersburg GUT Bonch-Bruyevich. 23-25 June 2014. (in Russian).

2013

  1. Igor Kotenko, Igor Saenko, Olga Polubelova, Andrey Chechulin. Design and Implementation of a Hybrid Ontological-Relational Data Repository for SIEM systems // Future internet, Vol. 5, 3, 2013. P.355-375. ISSN 1999-5903. // https://elibrary.ru/item.asp?id=28953990
  2. Igor Kotenko, Andrey Chechulin. A Cyber Attack Modeling and Impact Assessment Framework. 5th International Conference on Cyber Conflict 2013 (CyCon 2013). Proceedings. IEEE and NATO COE Publications. 4-7 June 2013, Tallinn, Estonia. 2013. P.119-142. (WoS, Scopus)
  3. Igor Kotenko, Andrey Chechulin. Computer Attack Modeling and Security Evaluation based on Attack Graphs. The IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS'2013). Proceedings. Berlin, Germany, September 12-14, 2013. P.614-619. DOI: 10.1109/IDAACS.2013.6662998 // https://elibrary.ru/item.asp?id=21908395
  4. I. Kotenko, A. Chechulin. A cyber attack modeling and impact assessment framework // : Pan American Health Care Exchanges, PAHCE. . "2013 5th International Conference on Cyber Conflict, CyCon 2013 - Proceedings" 2013. P. 6568374 // https://elibrary.ru/item.asp?id=23977532
  5. Igor Kotenko. Experiments with simulation of botnets and defense agent teams // 27th European Conference on Modelling and Simulation (ECMS 2013). Proceedings. May 27 - May 30st, Aalesund University College, Norway. 2013. P.61-67. DOI: 10.7148/2013-0061 // https://elibrary.ru/item.asp?id=21917518
  6. Igor Kotenko, Igor Saenko, Olga Polubelova and Elena Doynikova. The Ontology of Metrics for Security Evaluation and Decision Support in SIEM Systems // Proceedings - 2013 International Conference on Availability, Reliability and Security, ARES 2013. 2013. . 638-645. DOI: 10.1109/ARES.2013.84 // https://elibrary.ru/item.asp?id=21907177
  7. Igor Kotenko, Evgenia Novikova. Vissecanalyzer: a visual analytics tool for network security assessment // Lecture Notes in Computer Science. 2013. . 8128 LNCS. . 345-360. DOI: 10.1007/978-3-642-40588-4_24 // https://elibrary.ru/item.asp?id=21908848
  8. Igor Kotenko, Elena Doynikova. Security metrics for risk assessment of distributed information systems // Proceedings of the 2013 IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems, IDAACS 2013. 2013. . 646-650. DOI: 10.1109/IDAACS.2013.6663004 // https://elibrary.ru/item.asp?id=21908298
  9. Olga Polubelova, Igor Kotenko. Design of vulnerability ontologies and application of logical inference for security information and events menegement. Security of Information Technologies, Vol. 20, 1, 2013. P.21-24 // https://elibrary.ru/item.asp?id=21003113 (in Russian).
  10. Igor Kotenko, Olga Polubelova, Andrey Chechulin. Design of the ontology based data model for the network attack modeling system. Proceedings of SPIIRAS. Issue 3 (26). St.Petersburg, Nauka, 2013. P.26-39. // https://elibrary.ru/item.asp?id=19416903 (in Russian).
  11. Igor Kotenko, Elena Doynikova, Andrey Chechulin. Dynamical recalculation of the security metrics on the example of attack potentiality // Proceedings of SPIIRAN. 2013. No. 7 (30). pp. 26-39. // https://elibrary.ru/item.asp?id=20927236 (in Russian).
  12. Vasily Desnitsky, Igor Kotenko. Configurtion based design of secure embedded devices. Problems of information security. Computer systems. 2013. 1, P.44-54. // https://elibrary.ru/item.asp?id=19121738 (in Russian).
  13. Olga Polubelova, Igor Kotenko. The technique of filtering rules verification by model checking. Problems of information security. Computer systems, 1, 2013. P.151-168. // https://elibrary.ru/item.asp?id=19121749 (in Russian).
  14. Igor Kotenko, Andrey Chechulin. Toward network access control with software-defined networking // High availability systems. 2013. Vol. 9. No. 3. pp. 103-110. // https://elibrary.ru/item.asp?id=21046159 (in Russian).
  15. Vasily Desnitsky, Igor Kotenko, Andrey Chechulin. Verification of information flows for design of secure information systems with embedded devices // High availability systems, 2013. Vol. 9. No. 3. pp. 112-117. // https://elibrary.ru/item.asp?id=21046160 (in Russian).
  16. Dmitry Komashinskiy, Igor Kotenko, Andrey Chechulin, Andrey Shorov. Autoimatic system for categorization of websites for blocking web pages with inappropriate content // High availability systems. 2013. Vol. 9. No. 3. pp. 119-127. // https://www.elibrary.ru/item.asp?id=21046161 (in Russian).
  17. Igor Kotenko, Saenko I.B., Doynikova E.V. Risk assessment in computer networks of critical infrastructures // Innovations in science. 2013. No. 16-1. pp. 84-88. // https://elibrary.ru/item.asp?id=18766379 (in Russian).
  18. Alexey Konovalov, Igor Kotenko, Andrey Shorov. Simulation-based study of botnets and defense mechanisms against them. Journal of Computer and Systems Sciences International, 1, 2013, .45-68. ISSN 0002-3388. DOI: 10.7868/S0002338812060042 // https://elibrary.ru/item.asp?id=18444864 (in Russian).
  19. Igor Kotenko, Igor Saenko. Architecture of the system of intelligent information security services in critical infrastructures // Proceedings of SPIIRAS. Issue 1 (24). SPb: Nauka, 2013. P.21-40 // https://elibrary.ru/item.asp?id=18800054 (in Russian).
  20. Igor Kotenko, Igor Saenko. Scientific analysis and policy support for cyber security: the review of perspective research directions according to the results of the international workshop SA&PS4CS 2012. Proceedings of SPIIRAS. Issue 1 (24). SPb: Nauka, 2013. P.66-88. // https://elibrary.ru/item.asp?id=18800057 (in Russian).
  21. Igor Kotenko, Igor Saenko, Olga Polubelova. Perspective data storage systems for security information monitoring and management. Proceedings of SPIIRAS. Issue. 2 (25). SPb: Nauka, 2013. P.113-134. // https://elibrary.ru/item.asp?id=18867193 (in Russian).
  22. Igor Kotenko, Igor Saenko. Mathematical methods, models and architectures for computer network security: the review of perspective research directions according to the results of the International conference MMM-ACNS-2012 // Proceedings of SPIIRAS. Issue 2 (25). SPb: Nauka, 2013. P. 148-170 // https://elibrary.ru/item.asp?id=18867195 (in Russian).
  23. Philipp Nesteruk, Igor Kotenko. Tools for creation of neural network components of intelligent information security systems. Proceedings of SPIIRAS. Issue 3 (26). St. Petersburg, Nauka, 2013. P.7-25. // https://elibrary.ru/item.asp?id=19416902 (in Russian).
  24. Vasily Desnitsky, Igor Kotenko. Configuring embedded information protection systems within services providing complex security on rail transport. Proceedings of SPIIRAS. Issue 7 (30). St.Petersburg, Nauka, 2013. P.40-55. // https://elibrary.ru/item.asp?id=20927238 (in Russian).
  25. Igor Kotenko, Igor Saenko, Andrey Chernov, Maria Butakova. The construction of a multi-level intelligent information security system for automated systems of railway transport. Proceedings of SPIIRAS.Issue 7 (30). SPb: Nauka, 2013. P.7-25. // https://elibrary.ru/item.asp?id=20927233 (in Russian).
  26. Igor Kotenko, Evgenia Novikova. Visual analysis of computer network security assessment // Information and Control Systems, 2013, 3(64). P.55-61. // https://elibrary.ru/item.asp?id=20927233 (in Russian).
  27. Igor Kotenko, Igor Saenko. Perspective Methods and Models for Computer Networks Security and Security Support for Cyber Security: review of International Conference of MMM-ACNS-2012 and Workshop SA&PS4CS 2012. Management-information systems, 2013, 3, P.97-99. // https://www.elibrary.ru/item.asp?id=19082722 (in Russian).
  28. Evgenia Novikova, Igor Kotenko. The design of the visualisation subsystem of the SIEM-system// Information Technologies , 9, 2013.Moscow, New Technology. P.32-36. // https://elibrary.ru/item.asp?id=20270628 (in Russian).
  29. Igor Kotenko, Igor Saenko. International Conference "Mathematical Methods, Models and Architectures for Computer Networks Security" (MMM-ACNS-2012) and the International Workshop "Scientific Analysis and Policy Support for Cyber Security" (SA&PS4CS 2012). Information Security. Inside, 2013, 1. P.8-9 . (in Russian).
  30. Igor Kotenko, Igor Saenko. Intellectual services for information security in computer networks and systems. Information Security. Inside, 2013, 2. P.32-41. // https://elibrary.ru/item.asp?id=23048068 (in Russian).
  31. Igor Kotenko, Andrey Shorov. Infrastructure attack protection mechanisms based on bio-inspired approach "Network Nervous System". Issues of information Protection, 2(101), 2013. P.57-66. // https://elibrary.ru/item.asp?id=35685860 (in Russian).
  32. Igor Kotenko, Evgenia Novikova. Visualisation techniques for security information and event management. Issues of Information Protection, 3(102), 2013. .33-42. // https://elibrary.ru/item.asp?id=20276387 (in Russian).
  33. Dmitry Komashinskiy, Igor Kotenko. Data mining methods for malware detection: review of state-of-the-art. Issues of information Protection, 4(102), 2013. P.21-33. // https://www.elibrary.ru/item.asp?id=20781390 (in Russian).
  34. Igor Kotenko, Igor Saenko. Proposals for the construction of a multi-level intelligent information security system for automated systems of railway transport. Herald of Rostov State Transport University, 2013, 3(51). P.69-79. ISSN 0201-727X. // https://elibrary.ru/item.asp?id=20283971 (in Russian).
  35. Igor Kotenko, Igor Saenko, Rafael Yusupov. Perspective models and methods for computer networks security. Herald of the Russian Academy of Sciences, Vol. 83, 5, 2013. P. 463. DOI: 10.7868/S086958731305006X // https://elibrary.ru/item.asp?id=19051685 (in Russian).
  36. Igor Kotenko, Andrey Shorov. Investigation of bioinspired approaches for protection against infastructure attacks based on simulation framework // Technical sciences - from theory to practice. 2013. No. 17-1. pp. 39-43. // https://elibrary.ru/item.asp?id=20781325 (in Russian).
  37. Dmitry Kotenko, Igor Kotenko, Igor Saenko. Attack modeling in large computer networks. Technical sciences - from theory to practice, 17-1, 2013. Novosibirsk: Publishing House SibAK, 2013. P.12-16. // https://elibrary.ru/item.asp?id=20781320 (in Russian).
  38. Igor Kotenko, Igor Saenko. The system of intelligent information security services for critical infrastructures. Technical sciences - from theory to practice, 17-1, 2013. Novosibirsk: Publishing House SibAK, 2013. P.7-11 // https://elibrary.ru/item.asp?id=20781319 (in Russian).
  39. Igor Kotenko, Philipp Nesteruk, Andrey Shorov. Hybrid adaptive information protection system based on "nervous" and neural network biometaphors // Innovations in science, 16-1, 2013. Novosibirsk:. "SibAK", 2013. P.79-83. // https://elibrary.ru/item.asp?id=18766378 (in Russian).
  40. Alexey Konovalov, Igor Kotenko, Andrey Shorov. Simulation-Based Study of Botnets and Defense Mechanisms against Them. Journal of Computer and Systems Sciences International, Vol.52, Issue 1, 2013. P.43-65. Pleiades Publishing, Ltd., ISSN 1064-2307. DOI: 10.1134/S1064230712060044.
  41. Dmitry Komashinskiy, Igor Kotenko. Intelligent Data Analysis for Malware Detection. International Journal of Computing, Research Institute of Intelligent Computer Systems, Ternopil National Economic University. 2013, Vol.12, Issue 1. P.63-74. ISSN 1727-6209.
  42. Igor Kotenko, Philipp Nesteruk, Andrey Shorov. Conception of a Hybrid Adaptive Protection of Information Systems. International Journal of Computing. 2013. Vol. 12. 1. . 86-98. // https://elibrary.ru/item.asp?id=35263290
  43. Igor Kotenko, Elena Doynikova. Comprehensive Multilevel Security Risk Assessment of Distributed Information Systems. International Journal of Computing, Research Institute of Intelligent Computer Systems, Ternopil National Economic University. 2013, Vol.12, Issue 3. . 217-225 ISSN 1727-6209. https://computingonline.net/computing/article/view/602/564
  44. Andrey Chechulin, Igor Kotenko. Construction of attack graphs for security events correlation. 15th Conference RusCrypto on Cryptology, Steganography, Digital Signature and Security Systems. Solnechnogorsk, Russia. March 28-30, 2013. http://www.ruscrypto.ru/ (in Russian).
  45. Igor Kotenko. Attack modeling, security analysis and visualisation in the SIEM-systems. 15th Conference RusCrypto'2013. Solnechnogorsk, Russia. March 28-30, 2013. http://www.ruscrypto.ru/ (in Russian).
  46. Vasily Desnitsky, Igor Kotenko, Andrey Chechulin. Design of secure information systems with embedded devices. 15th Conference RusCrypto. Solnechnogorsk, Russia. March 28-30, 2013. http://www.ruscrypto.ru/ (in Russian).
  47. Dmitry Komashinskiy, Andrey Chechulin, Igor Kotenko, Andrey Shorov. Categorization of web sites for inadmissible web pages blocking systems. 15th Conference RusCrypto on Cryptology, Steganography, Digital Signature and Security Systems. Solnechnogorsk, Russia. March 28-30, 2013. http://www.ruscrypto.ru/ (in Russian).
  48. Igor Kotenko Attack modeling, calculation of the security metrics and visualization in the perspective SIEM-systems. International forum on practical security Positive Hack Days. Moscow. May 23-24, 2013. http://www.phdays.ru (in Russian).
  49. Doynikova E.V, Igor Kotenko. Security assessment for the computer networks on the base of the attack graphs and multilevel system of the security metrics. 22th All-Russian Conference Methods and technical tools of information security(MTTIS 2013). Proceedings. St.Petersburg, Russia. July 08-11, 2013. P.18-20. (in Russian).
  50. Igor Kotenko, Igor Saenko, Elena Doynikova, Olga Polubelova. Application of the ontology of the security metrics for the decision support in cyber security. 22th All-Russian Conference Methods and technical tools of information security(MTTIS 2013). Proceedings. St.Petersburg, Russia. July 08-11, 2013. P.32-33. (in Russian).
  51. Andrey Shorov, Andrey Chechulin, Igor Kotenko. Categorization of web sites for inadmissible web pages blocking for decision support systems in cyber security. 22th All-Russian Conference Methods and technical tools of information security(MTTIS 2013). Proceedings. St.Petersburg, Russia. July 08-11, 2013. P.75-77. (in Russian).
  52. Igor Saenko, Igor Kotenko, Olga Polubelova, Elena Doynikova. Application of the ontology of the security metrics for the selection of the countermeasures for the computer networks security. International congress IS&IT13 - International Conference on Artificial Intelligence and Systems. Proceedings. Moskow, Fizmathlit, 2013. Vol.2. P.372-377. ISBN 978-5-9221-1479-0. (in Russian).
  53. Igor Saenko, Igor Kotenko, Ivan Morozov. Use of genetic algorithms for the access control in geographic information systems. International congress IS&IT13 - International Conference on Artificial Intelligence and Systems.Proceedings. Moskow, Fizmathlit, 2013. Vol.2. P.58-63. ISBN 978-5-9221-1479-0 . (in Russian).
  54. Igor Kotenko, Igor Saenko. On construction a multi-level intelligent information security system for automated systems of railway transport. VIII Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2013)", Saint-Petersburg, October 23-25, 2013. The proceedings of conference, 2013. P.107-108 . (in Russian).
  55. Vasily Desnitsky, Igor Kotenko. Configuring embedded information protection systems within services of multi-level intelligent system of rail transport complex security. VIII Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2013)", Saint-Petersburg, October 23-25, 2013. The proceedings of conference, 2013. P.91-92. (in Russian).
  56. Igor Kotenko, Evgenia Novikova. An approach to design of the visual analytical system for security information management on Russian Railways. VIII Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2013)", Saint-Petersburg, October 23-25, 2013. The proceedings of conference, 2013. P.106-107. (in Russian).
  57. Igor Kotenko, Igor Saenko, Olga Polubelova, Elena Doynikova. Ontology of the security metrics for the computer network as basis for the selection of the countermeasures. VIII Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2013)", Saint-Petersburg, October 23-25, 2013. The proceedings of conference, 2013. P.108-109. (in Russian).
  58. Andrey Shorov, Andrey Chechulin, Igor Kotenko. Categorization of web sites for inadmissible web pages blocking systems by textual and graphical content analysis. VIII Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2013)", Saint-Petersburg, October 23-25, 2013. The proceedings of conference, 2013. P.129-130. (in Russian).
  59. Igor Kotenko. Intellectual information security services in security monitoring and management systems of critical infrastructures. VIII Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2013)", Saint-Petersburg, October 23-25, 2013. The proceedings of conference, 2013. (in Russian).
  60. Igor Kotenko, Andrey Shorov, Evgenia Novikova. Simulation of protection mechanisms based on "Nervous network system" against infrastructure attacks // Proceedings of the 21th Euromicro International Conference on Parallel, Distributed and network-based Processing (PDP 2013). Belfast, Northern Ireland, UK. 27th February 1st March 2013. Los Alamitos, California. IEEE Computer Society. 2013. P.526-533. DOI: 10.1109/PDP.2013.85 // https://elibrary.ru/item.asp?id=20428025
  61. Evgenia Novikova, Igor Kotenko. Analytical Visualization Techniques for Security Information and Event Management. Proceedings of the 21th Euromicro International Conference on Parallel, Distributed and network-based Processing (PDP 2013). Belfast, Northern Ireland, UK. 27th February 1st March 2013. Los Alamitos, California. IEEE Computer Society. 2013. P.519-525. DOI: 10.1109/PDP.2013.84 // https://elibrary.ru/item.asp?id=20427992
  62. V. Bogdanov, I. Kotenko. Policy-based proactive monitoring of security policy performance // Communications in Computer and Information Science. 2013. . 374. Part II. . 197-212. DOI: 10.1007/978-3-540-73986-9-17 // https://www.elibrary.ru/item.asp?id=21887939

2012

  1. Igor Kotenko, Andrey Chechulin, Evgenia Novikova. Attack Modelling and Security Evaluation for Security Information and Event Management. SECRYPT 2012. International Conference on Security and Cryptography. Proceedings. Rome, Italy. 2427 July 2012. P.391-394. // https://elibrary.ru/item.asp?id=20496746
  2. Igor Kotenko, Andrey Chechulin. Attack Modeling and Security Evaluation in SIEM Systems // International Transactions on Systems Science and Applications. 2012. . 8. . 129-147. // https://elibrary.ru/item.asp?id=28867303
  3. Igor Kotenko, Alexey Konovalov, Andrey Shorov. Discrete-Event Simulation of Botnet Protection Mechanisms // In book: Discrete Event Simulations - Development and Applications DOI: 10.5772/50101
  4. Vasily Desnitsky, Igor Kotenko, Andrey Chechulin. Configuration-based approach to embedded device security. Lecture Notes in Computer Science, Springer-Verlag // Lecture Notes in Computer Science. 2012. . 7531 LNCS. . 270-285. DOI: 10.1007/978-3-642-33704-8_23 // https://elibrary.ru/item.asp?id=20474247
  5. Andrey Chechulin, Igor Kotenko, Vasily Desnitsky. An Approach for Network Information Flow Analysis for Systems of Embedded Components // Lecture Notes in Computer Science. 2012. . 7531 LNCS. . 146-155. DOI: 10.1007/978-3-642-33704-8_13 // https://elibrary.ru/item.asp?id=20474240
  6. Igor Kotenko, Alexey Konovalov, Andrey Shorov. Agent‐based simulation of cooperative defence against botnets // Concurrency and Computation Practice and Experience 24(6):573 - 588, April 2012. DOI:10.1002/cpe.1858
  7. Igor Kotenko, Andrey Chechulin and Elena Doynikova. Analytical Attack Modeling in Security Information and Event Management Systems. Proceedings of the Work in Progress Session held in connection with the 20th Euromicro International Conference on Parallel, Distributed and network-based Processing (PDP 2012). Garching/Munich, February 2012. SEA-Publications. SEA-SR-31. 2012. P.27-28. // https://elibrary.ru/item.asp?id=28166372
  8. Igor Kotenko, Andrey Chechulin. Common Framework for Attack Modeling and Security Evaluation in SIEM Systems // Proceedings - 2012 IEEE Int. Conf. on Green Computing and Communications, GreenCom 2012, Conf. on Internet of Things, iThings 2012 and Conf. on Cyber, Physical and Social Computing, CPSCom 2012. 2012. . 94-101. DOI: 10.1109/GreenCom.2012.24 // https://elibrary.ru/item.asp?id=20475202
  9. Igor Kotenko, Igor Saenko, Olga Polubelova, Andrey Chechulin. Technologies of security information and event management for computer network protection // Computer systems. 3, 2012. P.57-68. // https://elibrary.ru/item.asp?id=17867303 (in Russian).
  10. Vasily Desnitsky, Igor Kotenko, Andrey Chechulin. Configuring of combined protection components for embedded devices by solving optimality task // Highly Available Systems. 2012. . 8. 2. . 50-56. eLIBRARY ID: 17997821 (in Russian).
  11. Vasily Desnitsky, Igor Kotenko, Andrey Chechulin. Configuration of secure systems with embedded and mobile devices // Information security issues. 2012. No. 2 (97). pp. 20-28. // https://elibrary.ru/item.asp?id=17795186 (in Russian).
  12. Igor Kotenko, Philipp Nesteruk, Andrey Shorov. Network protection methods based on bio-inspired approaches // Issues of information Protection,2012, 2(97), P.35-46. // https://elibrary.ru/item.asp?id=17795188 (in Russian).
  13. Dmitry Komashinskiy, Igor Kotenko. Investigation of structural specificities of malicious documents by DATA MINING // Information Technologies and Computing Systems, 2, 2012, P.76-92. // https://www.elibrary.ru/item.asp?id=18963329 (in Russian).
  14. Dmitry Komashinskiy, Igor Kotenko. Detecting malicious portable document format files with data mining techniques // Problems of information security. Computer systems. 1, 2012, P.19-35. // https://www.elibrary.ru/item.asp?id=17695523 (in Russian).
  15. Andrey Chechulin, Igor Kotenko, Vasily Desnitsky. Information flow analysis techniques for development of secure systems which includes embedded systems // High availability systems. 2012. Vol. 8. No. 2. pp. 116-122 // https://elibrary.ru/item.asp?id=17997830 (in Russian).
  16. Olga Polubelova, Igor Kotenko, Igor Saenko, Andrey Chechulin. Applying ontologies and logical inference for security information and event menegement // High availability systems, Vol.8, 2, 2012. P.100-108. // https://elibrary.ru/item.asp?id=17997828 (in Russian).
  17. Evgenia Novikova, Igor Kotenko. Visualization techniques in siem-systems // High availability systems, Vol. 8, 2, 2012. P.91-99. // https://elibrary.ru/item.asp?id=17997827 (in Russian).
  18. Vasily Desnitsky, Igor Kotenko. A model for configuring protected and energy-efficient embedded systems. Journal of Instrument Engineering, Vol.55, 11, 2012. P.5257. // https://www.elibrary.ru/item.asp?id=18045936 (in Russian).
  19. Dmitry Komashinskiy, Igor Kotenko. An extraction method for structural features to detect harmful software. Journal of Instrument Engineering, Vol.55, 11, 2012. P.58-63. // https://www.elibrary.ru/item.asp?id=18045937 (in Russian).
  20. Igor Kotenko, Igor Saenko, Olga Polubelova, Andrey Chechulin. Application of the methods of security event and information management for information protection in the critical infrastructures. Proceedings of SPIIRAS. Issue 1 (20). St.Petersburg, Nauka, 2012. P.27-56. // https://elibrary.ru/item.asp?id=17918594 (in Russian).
  21. Igor Kotenko, Andrey Shorov. Simulation of the Protection Mechanisms against Infrastructural Attacks based on Nervous Network System. Proceedings of SPIIRAS. Issue 3 (22). St. Petersburg, Nauka, 2012. P.4570. // https://www.elibrary.ru/item.asp?id=17918623 (in Russian).
  22. Igor Kotenko, Igor Saenko. Developing the system of intelligent services to protect information in cyber warfare // Proceedings of SPIIRAN. 2012. No. 3 (22). pp. 84-100. // https://elibrary.ru/item.asp?id=17918625 (in Russian).
  23. Olga Polubelova, Igor Kotenko. Verification of security policy filtering rules containing temporal parameters by Model Checking. Proceedings of SPIIRAS. Issue 3 (22). St. Petersburg, Nauka, 2012. P.113-138. // https://elibrary.ru/item.asp?id=17918627 (in Russian).
  24. Dmitry Kotenko, Igor Kotenko, Igor Saenko. Methods and tools for simulation of attacks in large computer networks: state of the problem. Proceedings of SPIIRAS. Issue 3 (22). St. Petersburg, Nauka, 2012. P.5-30. // https://elibrary.ru/item.asp?id=17918621 (in Russian).
  25. Dmitry Kotenko, Igor Kotenko, Igor Saenko. Methodology of iterative attack modelling in large computer networks. Proceedings of SPIIRAS. Issue 4 (23). St. Petersburg, Nauka, 2012. P.50-79. // https://elibrary.ru/item.asp?id=18263541 (in Russian).
  26. Igor Kotenko, Philipp Nesteruk, Andrey Shorov. The concept of adaptive security of information technology systems based on paradigms of neural and nervous networks. Proceedings of SPIIRAS. Issue 4 (23). St. Petersburg, Nauka, 2012. P.100-115.// https://elibrary.ru/item.asp?id=18263544 (in Russian).
  27. Evgenia Novikova, Igor Kotenko. The analysis of the visualization techniques to ensure the protection of information in computer networks // Proceedings of SPIIRAS. Issue.4 (23). SPb.: Science, 2012. Pp. 7-29.// https://www.elibrary.ru/item.asp?id=18263539 (in Russian).
  28. Igor Kotenko, Alexey Konovalov, Andrey Shorov. Investigative Simulation of Botnets and Defence Mechanisms against them. Appendix to the Information Technologies Journal. Moscow, New Technology, 2012, 1. 32 pages. ISSN 1684-6400. (in Russian).
  29. Igor Kotenko, Elena Doynikova. SCAP protocol overview. Information Security. Inside, 2(44), 2012. P.56-63 // https://elibrary.ru/item.asp?id=23063431 (in Russian).
  30. Igor Kotenko, Elena Doynikova, Andrey Chechulin. Total enumeration and classification of attack patterns (CAPEC): description and application examples. Information Security. Inside, 4(46), 2012. P.54-66 // https://elibrary.ru/item.asp?id=23063462 (in Russian).
  31. Igor Kotenko, Igor Saenko. SIEM-systems for security information and event management. Information Security. Inside, 2012. 5 (47). . 54-65. // https://elibrary.ru/item.asp?id=23063477 (in Russian).
  32. Igor Kotenko, Igor Saenko, Rafael Yusupov. Intelligent security services as cybernetic counteraction tool . Scientific-Practical Proceedings on information counteraction problems, The Security Council of the Russian Federation. Moskow, 2012. (in Russian).
  33. Igor Kotenko, Alexey Konovalov, Andrey Shorov. Agent-based simulation of cooperative defense against botnets. Concurrency and Computation: Practice and Experience, Vol. 24, Issue 6, 2012. .573-588.
  34. Igor Kotenko, Andrey Shorov, Philipp Nesteruk. The analysis of bio-inspired approaches to protect computer systems and networks. XVI All-Russian Scientific Conference Neuroinformatics-2012. Proceedings.Issue 2. Moscow, MIPI, 2012. P.61-71. (in Russian).
  35. Igor Kotenko. Analytical attack modeling and event processing in security event and information management systems. 14th Conference RusCrypto on Cryptology, Steganography, Digital Signature and Security Systems. Solnechnogorsk, Russia. March 28-30, 2012. http://www.ruscrypto.ru/ (in Russian).
  36. Igor Kotenko. Cyberwars of software agents: application of the intelligent agent teamwork theory for cyber army building. International forum on practical security Positive Hack Days. Moscow. May 30-31, 2012. http://www.phdays.ru (in Russian).
  37. Vasily Desnitsky, Igor Kotenko. Configuring information and telecommunication systems with embedded devices. 21th All-Russian Conference Methods and technical tools of information security(MTTIS 2012). Proceedings. St.Petersburg, Russia. June 24-29, 2012.P.14-17. (in Russian).
  38. Elena Doynikova, Dmitry Kotenko, Igor Kotenko. Analysis of the intrusions using attack and service dependency graphs. 21th All-Russian Conference "Methods and technical tools of information security" (MTTIS 2012). Proceedings. St.Petersburg, Russia. June 24-29, 2012. P.45-47. (in Russian).
  39. Igor Kotenko, Andrey Chechulin. Analytical attack modeling in security event and information management systems. 21th All-Russian Conference "Methods and technical tools of information security" (MTTIS 2012). Proceedings. St.Petersburg, Russia. June 24-29, 2012. P.57-58. (in Russian).
  40. Philipp Nesteruk, Igor Kotenko. Formation of fuzzy knowledge base for adaptive information protection systems. 21th All-Russian Conference "Methods and technical tools of information security" (MTTIS 2012). Proceedings. St.Petersburg, Russia. June 24-29, 2012. P.64-65. (in Russian).
  41. Igor Saenko, Igor Kotenko, Olga Polubelova. The use of an ontological approach to construct a vulnerabilities model based on the SCAP. 21th All-Russian Conference "Methods and technical tools of information security" (MTTIS 2012). Proceedings. St.Petersburg, Russia. June 24-29, 2012. P.74-76. (in Russian).
  42. Andrey Chechulin, Vasily Desnitsky, Igor Kotenko. Information flow analysis for development of secure systems with embedded devices. 21th All-Russian Conference "Methods and technical tools of information security" (MTTIS 2012). Proceedings. St.Petersburg, Russia. June 24-29, 2012. P.35-37. (in Russian).
  43. Igor Kotenko, Andrey Chechulin. Analytical attack modeling for security event and information management. International congress IS&IT - International Conference on Artificial Intelligence and Systems. Proceedings. Divnomorskoye, Black Sea Coast, Russia. September 2-9. Moskow, Fizmathlit, 2012. Vol.1. P.385-391. // https://www.elibrary.ru/item.asp?id=29293575 (in Russian).
  44. Igor Kotenko, Igor Saenko. The use of genetic algorithms in optimization problems of the information access control. International congress IS&IT - International Conference on Artificial Intelligence and Systems. Proceedings. Divnomorskoye, Black Sea Coast, Russia. September 2-9. Moskow, Fizmathlit, 2012. Vol.1. P.40-45. (in Russian).
  45. Olga Polubelova, Igor Kotenko, Igor Saenko. Ontological approach to the construction of intelligent services for security event storage and processing. International congress IS&IT - International Conference on Artificial Intelligence and Systems. Proceedings. Divnomorskoye, Black Sea Coast, Russia. September 2-9. Moskow, Fizmathlit, 2012. Vol. 2. P.394-399. (in Russian).
  46. Igor Kotenko, Rafael Yusupov. Cybersecurity: current state and development trends. The St.Petersburg Scientific Forum Science and Society. Information technologies. Seventh St.Petersburg Meeting of the Nobel Prize laureates. Proceedings. St.Petersburg. 2012. P.55-56. (in Russian).
  47. Andrey Shorov, Igor Kotenko. The Bioinspired Approaches to Protect Computer Networks from Infrastructure Attacks. St. Petersburg Scientific Forum "Science and Society". "Science and Mankind Progress". VII St. Petersburg Nobel Prize Laureates Meeting. Proceedings. St.Petersburg. P.149-150. (in Russian).
  48. Evgenia Novikova, Chechulin A.A., Igor Kotenko. Visualisation techniques for computer attack counteraction in security information and event management systems. St. Petersburg Scientific Forum "Science and Society". "Science and Mankind Progress". VII St.Petersburg Nobel Prize Laureates Meeting. Proceedings. St.Petersburg, Russia. P.151-152. (in Russian).
  49. Igor Kotenko, Rafael Yusupov. Current state and development trends in the field of construction of secure computer systems. 5th Russian Multiconference on Problems in Control (MPC). Conference on Information Technologies in Control (ITC).Proceedings. St.Petersburg, Russia. October 911, 2012. P.671-675. // https://www.elibrary.ru/item.asp?id=21721941 (in Russian).
  50. Vasily Desnitsky, Igor Kotenko, Andrey Chechulin. Design of secure embedded systems in European Union project SecFutur. 5th Russian Multiconference on Problems in Control (MPC). Conference on Information Technologies in Control (ITC).Proceedings. St.Petersburg, Russia. October 911, 2012. P.699-708. // https://www.elibrary.ru/item.asp?id=21718338 (in Russian).
  51. Andrey Chechulin, Igor Kotenko, Evgenia Novikova, Elena Doynikova. Attacks and protection mechanisms in the security event and information management. 5th Russian Multiconference on Problems in Control (MPC). Conference on Information Technologies in Control (ITC).Proceedings. St.Petersburg, Russia. October 911, 2012. P.735-739. // https://elibrary.ru/item.asp?id=21721925 (in Russian).
  52. Olga Polubelova, Igor Kotenko, Igor Saenko. Methods of data presentation and inference information management and security event // 5th Russian Multiconference on Problems in Control (MPC). Conference on Information Technologies in Control (ITC).Proceedings. St.Petersburg, Russia. October 911, 2012. P.723-728. // https://elibrary.ru/item.asp?id=21720290 (in Russian).
  53. Vasily Desnitsky, Andrey Chechulin, Igor Kotenko. Using anytime algorithms of attack modeling and security evaluation in SIEM systems. XIII Saint-Petersburg International Conference Regional informatics-2012 (RI-2012). Proceedings. St. Petersburg, 2012. P. 92. (in Russian).
  54. Elena Doynikova, Igor Kotenko. Integrated approach for security metric set constructing for risk assessment and reaction to intrusions. XIII Saint-Petersburg International Conference Regional informatics-2012 (RI-2012). Proceedings. St. Petersburg, 2012. P.94. (in Russian).
  55. Igor Kotenko, Philipp Nesteruk. On the development of an adaptive information protection system for computer networks. XIII Saint-Petersburg International Conference Regional informatics-2012 (RI-2012). Proceedings. St. Petersburg, 2012. P.102. (in Russian).
  56. Andrey Chechulin, Igor Kotenko. Attack graph building based on malefactor models and information on vulnerabilities and attack patterns. XIII Saint-Petersburg International Conference Regional informatics-2012 (RI-2012). Proceedings. St. Petersburg, 2012. P.129-130. // https://www.elibrary.ru/item.asp?id=35097362 (in Russian).
  57. Igor Saenko, Igor Kotenko. Design and Performance Evaluation of Improved Genetic Algorithm for Role Mining Problem. Proceeding of the 20th International Euromicro Conference on Parallel, Distributed and Network-based Processing (PDP 2012). Garching/Munich, February, 2012. P.269-274. DOI: 10.1109/PDP.2012.31 // https://elibrary.ru/item.asp?id=17990577
  58. Jose Fran. Ruiz, Vasily Desnitsky, Rajesh Harjani, Antonio Manna, Igor Kotenko and Andrey Chechulin. A Methodology for the Analysis and Modeling of Security Threats and Attacks for Systems of Embedded Components // : Proceedings - 20th Euromicro International Conference on Parallel, Distributed and Network-Based Processing, PDP 2012. 20th Euromicro International Conference on Parallel, Distributed and Network-Based Processing, PDP 2012. Garching, 2012. . 261-268. DOI: 10.1109/PDP.2012.36 // https://www.elibrary.ru/item.asp?id=17990791
  59. Igor Kotenko, Olga Polubelova, Igor Saenko. Hybrid Data Repository Development and Implementation for Security Information and Event Management. Proceedings of the Work in Progress Session held in connection with the 20th Euromicro International Conference on Parallel, Distributed and network-based Processing (PDP 2012). Garching/Munich, February 2012. SEA-Publications. SEA-SR-31. 2012. P.29-30.
  60. D. Komashinskiy and Igor Kotenko. Using Low-Level Dynamic Attributes for Malware Detection based on Data Mining Methods // Lecture Notes in Computer Science. 2012. . 7531 LNCS. . 254-269. DOI: 10.1007/978-3-642-33704-8_22 // https://www.elibrary.ru/item.asp?id=20474238
  61. Igor Kotenko. Cyber Wars of Intelligent Agents in the Internet. The Second International Workshop Scientific Analysis and Policy Support for Cyber Security (SA&PS4CS 2012). St. Petersburg, Russia, October 20, 2012. P.10.
  62. Igor Kotenko, Olga Polubelova, Igor Saenko. Data Repository for Security Information and Event Management in service infrastructures // SECRYPT 2012 - Proceedings of the International Conference on Security and Cryptography. 2012. . 308-313. // https://elibrary.ru/item.asp?id=20496612
  63. Igor Kotenko, Andrey Shorov. Simulation of Protection Mechanisms against Botnets on The Basis of Nervous Network Framework. Proceedings of the 2nd International Conference on Simulation and Modeling Methodologies, Technologies and Applications (SIMULTECH 2012), SciTePress, 2012. P.164-169. // https://www.elibrary.ru/item.asp?id=20497014
  64. Igor Kotenko, Olga Polubelova, Igor Saenko. The Ontological Approach for SIEM Data Repository Implementation. 2012 IEEE International Conference on Green Computing and Communications, Conference on Internet of Things, and Conference on Cyber, Physical and Social Computing. Besançon, France, September 11-14, 2012. Los Alamitos, California. IEEE Computer Society. 2012. P.761-766. DOI: 10.1109/GreenCom.2012.125 // https://elibrary.ru/item.asp?id=20475186
  65. F. Sailhan, H. Ning, I. Kotenko. Message from the ITHINGS 2012 program co-chairs // Proceedings - 2012 IEEE Int. Conf. on Green Computing and Communications, GreenCom 2012, Conf. on Internet of Things, iThings 2012 and Conf. on Cyber, Physical and Social Computing, CPSCom 2012. 2012. . 6468422. DOI: 10.1109/GreenCom.2012.144 // https://www.elibrary.ru/item.asp?id=20475195

2011

  1. Igor Kotenko, Mikhail Stepashkin, Elena Doynikova. Security analysis of information systems taking into account social engineering attacks. Proceedings of the 19th Euromicro International Conference on Parallel, Distributed and network-based Processing (PDP 2011). Ayia Napa, Cyprus, 9-11 February, 2011. Los Alamitos, California. IEEE Computer Society. 2011. P.611-618. DOI: 10.1109/PDP.2011.62 // https://elibrary.ru/item.asp?id=16984038
  2. Igor Kotenko, Alexey Konovalov, Andrey Shorov. Agent-based simulation of cooperative defence against botnets // Concurrency Computation Practice and Experience. 2012. . 24. 6. . 573-588. DOI: 10.1002/cpe.1858 // https://www.elibrary.ru/item.asp?id=17979717
  3. Igor Saenko, Igor Kotenko. Genetic Algorithms for Role Mining Problem. Proceedings of the 19th Euromicro International Conference on Parallel, Distributed and network-based Processing (PDP 2011). Ayia Napa, Cyprus, 9-11 February, 2011. Los Alamitos, California. IEEE Computer Society. 2011. P.646-650. DOI: 10.1109/PDP.2011.63 // https://elibrary.ru/item.asp?id=16989134
  4. Vasily Desnitsky, Igor Kotenko, Andrey Chechulin. An abstract model for embedded systems and intruders // Proceedings of the Work in Progress Session held in connection with the 19th Euromicro International Conference on Parallel, Distributed and network-based Processing (PDP 2011). Ayia Napa, Cyprus, February 2011. SEA-Publications. SEA-SR-29. 2011. P.25-26. ISBN 978-3-902457-29-5. // https://www.elibrary.ru/item.asp?id=28132924
  5. Igor Kotenko. Cyber Security: Current State and Future Landscape. View from Russia. The Interface of Science, Technology & Security: Areas of most Concern, Now and Ahead. APCSS SEMINAR Proceedings, Honolulu, Hawaii, 4-8 October 2010. Asia-Pacific Center for Security Studies. USA. 2011. .79-81
  6. Igor Kotenko, Olga Polubelova. Verification of Security Policy Filtering Rules by Model Checking. Proceedings of IEEE Fourth International Workshop on "Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications" (IDAACS'2011). Prague, Czech Republic, 15-17 September 2011. P.706-710. ISBN 978-1-4244-4882-1. DOI: 10.1109/IDAACS.2011.6072862 // https://elibrary.ru/item.asp?id=18016546
  7. Igor Kotenko, Alexey Konovalov, Andrey Shorov. Simulation of botnets and protection mechanisms against them: software environment and experiments. 16th Nordic Conference on Secure IT-Systems. October 26th-28th, 2011. Tallinn, Estonia, Preproceedings, Cybernetica, 2011. P.119-126.
  8. Igor Kotenko, Andrey Chechulin, Elena Doynikova. Combining of Scanning Protection Mechanisms in GIS and Corporate Information Systems // Lecture Notes in Geoinformation and Cartography. . "Information Fusion and Geographic Information Systems: Towards the Digital Ocean, IF and GIS 2011" 2011. . 45-58. DOI: 10.1007/978-3-642-19766-6_5 // https://elibrary.ru/item.asp?id=20528069
  9. Igor Kotenko, Igor Saenko, Rafael Yusupov. Protection of Information Resources in Computer Networks. Herald of the Russian Academy of Sciences, Vol.81, 8, 2011. P.746-747. ISSN 1019:3316. // https://elibrary.ru/item.asp?id=16537831 (in Russian).
  10. Igor Kotenko, Igor Saenko, Rafael Yusupov. Scientific Analysis and Policy Support for Security in Cyberspace. Herald of the Russian Academy of Sciences, Vol.81, 9, 2011. P.844-845. ISSN 1019:3316. // https://www.elibrary.ru/item.asp?id=16893140 (in Russian).
  11. Igor Kotenko, Philipp Nesteruk, Andrey Chechulin. Combining of scanning detection mechanisms in computer networks // Information security issues. 2011. No. 3 (94). pp. 30-34 // https://elibrary.ru/item.asp?id=17306706 (in Russian).
  12. Igor Kotenko, Alexey Konovalov, Andrey Shorov. Agent-based modeling and simulation of botnets and botnet defense. Protection issues of information, 2011, 3(94), P.24-29. // https://www.elibrary.ru/item.asp?id=17306705 (in Russian).
  13. Igor Kotenko, Alexey Konovalov, Andrey Shorov. Simulation of botnets and defense mechanisms against them // High availability systems. 2011. Vol. 7. No. 2. pp. 107-111.// https://www.elibrary.ru/item.asp?id=17098473 (in Russian).
  14. Igor Saenko, Igor Kotenko. Genetic optimization of role-based access schemes // High availability systems, No.2, 2011. P.112-116. // https://www.elibrary.ru/item.asp?id=17098474 (in Russian).
  15. Igor Kotenko, Mikhail Stepashkin, Elena Doynikova. Protection analysis of information systems taking into account social engineering attacks. Problems of information security. Computer systems. 2011, 3. P.40-57 // https://elibrary.ru/item.asp?id=17077012 (in Russian).
  16. Igor Kotenko, Mikhail Stepashkin, Dmitry Kotenko, Elena Doynikova. Information systems security evaluation on the base of social engineering attacks trees. Journal of Instrument Engineering , .54, 12, 2011. P.5-9. ISSN 0021-3454. (in Russian).
  17. Igor Kotenko, Andrey Shorov. The use of biological metaphors to protect computer systems and networks: a preliminary analysis of the basic approaches. Information Security // Information Security. Inside, 2011. 2(38), P.66-75. // https://www.elibrary.ru/item.asp?id=23134092 (in Russian).
  18. Igor Kotenko, Vasily Desnitsky, Andrey Chechulin. Investigation of technologies for secure embedded systems design in European Union project SecFutur. Information Security. Inside, 3(39), 2011. P.68-75.// https://www.elibrary.ru/item.asp?id=23134338 (in Russian).
  19. Igor Kotenko, Elena Doynikova. Vulnerabilities assessment techniques: use for the computer systems security analysis. Information Security. Inside, 49;0), 2011. P.74-81. // https://elibrary.ru/item.asp?id=23099965 (in Russian).
  20. Igor Kotenko, Elena Doynikova. CVSS vulnerability assessment system and its use for computer system security analysis // Information Security. Inside, 5(41), 2011. P.54-60 // https://elibrary.ru/item.asp?id=23099118 (in Russian).
  21. Igor Kotenko, Elena Doynikova. Misuse and configuration scoring systems (CMSS and CCSS) for the unified computer systems security analysis. Information Security. Inside, 6(42), 2011. P.52-60. // https://elibrary.ru/item.asp?id=23093443 (in Russian).
  22. Igor Kotenko, Andrey Shorov, Philipp Nesteruk. Analysis of bio-inspired approaches for protection of computer systems and networks // Proceedings of SPIIRAS. Issue 3 (18). St.Petersburg, Nauka, 2011. P.19-73. // https://elibrary.ru/item.asp?id=17103979 (in Russian).
  23. Igor Kotenko, Alexey Konovalov, Andrey Shorov. Simulation of protection mechanisms against botnets. Proceedings of SPIIRAS. Issue 4 (19). St.Petersburg, Nauka, 2011. . 7. // https://www.elibrary.ru/item.asp?id=17288935 (in Russian).
  24. Vasily Desnitsky, Igor Kotenko, Andrey Chechulin. Constructing and testing secure embedded systems. XII Saint-Petersburg International Conference Regional informatics-2010 (RI-2010). Selected Proceedings. St. Petersburg, 2011. P.115-121. // https://www.elibrary.ru/item.asp?id=29293611 (in Russian).
  25. Igor Kotenko, Alexey Konovalov, Andrey Shorov. Simulation of defense against botnets in the Internet. XII Saint-Petersburg International Conference Regional informatics-2010 (RI-2010). Selected Proceedings. St. Petersburg, 2011. P.121-132. (in Russian).
  26. Andrey Chechulin, Igor Kotenko. Combining of scanning detection mechanisms. The Ninth All-Russian Scientific Conference "Mathematics and Security of Information Technologies" (MSIT-10). Moscow, 2011. (in Russian).
  27. Vasily Desnitsky, Igor Kotenko, Andrey Chechulin. Abstract model for embedded secure systems. The Nineth All-Russian Scientific Conference "Mathematics and Security of Information Technologies" (MSIT-10). Moscow, 2011. (in Russian).
  28. Alexey Konovalov, Igor Kotenko, Andrey Shorov. The experiments for exploring of botnets. The Nineth All-Russian Scientific Conference "Mathematics and Security of Information Technologies" (MSIT-10). Moscow, 2011. (in Russian).
  29. Igor Kotenko. Modeling and analysis of the cybersecurity mechanisms. 13th Conference RusCrypto on Cryptology, Steganography, Digital Signature and Security Systems. Solnechnogorsk, Russia. March 30 - April 2, 2011. http://www.ruscrypto.ru/ (in Russian).
  30. Igor Saenko, Igor Kotenko. Method of genetic optimization of schemes for role-based access to information. 13th Conference RusCrypto on Cryptology, Steganography, Digital Signature and Security Systems. Solnechnogorsk, Russia. March 30 - April 2, 2011. http://www.ruscrypto.ru/ (in Russian).
  31. Dmitry Komashinkiy, Andrey Chechulin, Igor Kotenko. Categorization of web pages with inadmissible content. 13th Conference RusCrypto on Cryptology, Steganography, Digital Signature and Security Systems. Solnechnogorsk, Russia. March 30 - April 2, 2011. http://www.ruscrypto.ru/ (in Russian).
  32. Elena Doynikova, Igor Kotenko. Extension of the informasion risks assessment techniques via application of the service dependency graphs. 20th All-Russian Conference Methods and technical tools of information security (MTTIS 2011). Proceedings. St.Petersburg, Russia. June 27 - July 01, 2011. P.131-132. (in Russian).
  33. Igor Kotenko, Philipp Nesteruk. The principles of an adaptive security systems creation. Tools for security analysis of automated systems. 20th All-Russian Conference Methods and technical tools of information security (MTTIS 2011). Proceedings. St.Petersburg, Russia. June 27 - July 01, 2011. P.32-33. (in Russian).
  34. Igor Saenko, Olga Polubelova, Igor Kotenko. Design of SIEM repository for a heterogeneous infrastructure. 20th All-Russian Conference Methods and technical tools of information security (MTTIS 2011). Proceedings. St.Petersburg, Russia. June 27 - July 01, 2011. .41-42. (in Russian).
  35. Andrey Shorov, Igor Kotenko. The set-theoretic representation of simulation models of infrastructure attacks and defense mechanisms against them // In the collection: Simulation modeling. Theory and practice. IMMOD-2011. 2011. pp. 306-310. // https://www.elibrary.ru/item.asp?id=36260430 (in Russian).
  36. Andrey Chechulin, Igor Kotenko. Analysis of security events in a real network using a network attack modelling system. VII St.Petersburg Interregional Conference Information Security of Russian Regions (IBRR-2011). October 26-28, 2011. Proceedings. St.Petersburg, 2011. P.97-98. // https://www.elibrary.ru/item.asp?id=35242777 (in Russian).
  37. Vasily Desnitsky, Igor Kotenko, Andrey Chechulin. Configuration model for combined protection of information systems with embedded devices. VII St.Petersburg Interregional Conference Information Security of Russian Regions (IBRR-2011). October 26-28, 2011. Proceedings. St.Petersburg, 2011. P.69-70. (in Russian).
  38. Elena Doynikova, Andrey Chechulin, Igor Kotenko, Dmitry Kotenko. Extension of information risk assessment methodology to account for zero-day attacks // VII St.Petersburg Interregional Conference Information Security of Russian Regions (IBRR-2011). October 26-28, 2011. Proceedings. St.Petersburg, 2011. P.71-72. // https://elibrary.ru/item.asp?id=35242695 (in Russian).
  39. Igor Kotenko, Igor Saenko, Olga Polubelova, Andrey Chechulin. Methods and tools of designing the repository for SIEM system in critical information infrastructure. The VII St.Petersburg Interregional Conference Information Security of Russian Regions (ISRR-2011). October 26-28, 2011. Proceedings. St.Petersburg, 2011. P.79-80. // https://elibrary.ru/item.asp?id=35244528 (in Russian).
  40. Dmitry Komashinkiy, Igor Kotenko. Methods of machine learning in anti-cyberthreat systems. VII St.Petersburg Interregional Conference Information Security of Russian Regions (IBRR-2011). October 26-28, 2011. Proceedings. St.Petersburg, 2011. P.76-77. (in Russian).
  41. Philipp Nesteruk, Igor Kotenko. The components of development of adaptive computer network security system. VII St.Petersburg Interregional Conference Information Security of Russian Regions (IBRR-2011). October 26-28, 2011. Proceedings. St.Petersburg, 2011. P.84-85.// https://elibrary.ru/item.asp?id=35267525 (in Russian).
  42. Igor Saenko, Igor Kotenko. An improved genetic algorithm to solve the role mining problem in RBAC systems. VII St.Petersburg Interregional Conference Information Security of Russian Regions (IBRR-2011). October 26-28, 2011. Proceedings. St.Petersburg, 2011. P.92-93. (in Russian).
  43. D.V. Komashinsky, I.V. Kotenko, A.A. Chechulin. Categorization of websites for blocking web pages with inappropriate content // High availability systems. 2011. Vol. 7. No. 2. pp. 102-106. // https://www.elibrary.ru/item.asp?id=17098472 (in Russian).
  44. I.V. Kotenko, M.V. Stepashkin, D.I. Kotenko, E.V. Doynikova. Assessment of information system protectability on the base of development of tree of social engineering attack // Izvestia of higher educational institutions. Instrumentation. 2011. Vol. 54. No. 12. pp. 5-9. // https://elibrary.ru/item.asp?id=17077187 (in Russian).
  45. Igor Kotenko, Andrey Shorov. The use of biological metaphors to protect computer systems and networks: a preliminary analysis of the basic approaches. Information Security. Inside, 2011. 1(37), P.52-57. // https://www.elibrary.ru/item.asp?id=23134080 (in Russian).

2010

  1. Igor Kotenko. Agent-Based Modeling and Simulation of Network Infrastructure Cyber-Attacks and Cooperative Defense Mechanisms // In book: Discrete Event Simulations, August 2010. DOI:10.5772/46961
  2. Vasily Desnitsky, Igor Kotenko. Combined protection of software from unauthorized modifications // News of higher educational institutions. Instrumentation. 2010. Vol. 53. No. 11. pp. 36-41. // https://www.elibrary.ru/item.asp?id=15503308 (in Russian).
  3. I.Kotenko. Agent-Based Modelling and Simulation of Network Cyber-Attacks and Cooperative Defence Mechanisms. Discrete Event Simulations. Sciyo, In-teh. 2010. P.223-246. ISBN 978-953-307-115-2 // https://cdn.intechopen.com/pdfs/11547/InTech-Agent_based_modeling_and_simulation_of_network_infrastructure_cyber_attacks_and_cooperative_defense_mechanisms.pdf (in Russian).
  4. Igor Kotenko, Alexey Konovalov, Andrey Shorov. Investigation of botnets and botnet defense based on simulation metnods. Journal of Instrument Engineering, Vol.53, 11, 2010, P.42-45. ISSN 0021-3454. (in Russian).
  5. Andrey Chechulin, Igor Kotenko. Combining scanning protection mechanisms in computer networks // Information and control systems. 2010. No. 6 (49). pp. 21-27. // https://www.elibrary.ru/item.asp?id=15581568 (in Russian).
  6. V. Desnitsky, I. Kotenko. Protectability and scalability of software protection mechanism based on remote entrusting principles // Proceedings of Institute of System Analysis of Russian Academy of Science. Moscow, 2010. Vol.52, P.50-67 // https://www.elibrary.ru/item.asp?id=23938231 (in Russian).
  7. Dmitry Komashinskiy, Igor Kotenko. Malware Detection by Data Mining Techniques Based on Positionally Dependent Features. Proceedings of the 18th Euromicro International Conference on Parallel, Distributed and network-based Processing (PDP 2010). Pisa, Italy, 17-19 February, 2010. Los Alamitos, California. IEEE Computer Society. 2010. P.617-623. ISSN 1066-6192. ISBN 978-0-7695-3939-3. DOI: 10.1109/PDP.2010.30 // https://www.elibrary.ru/item.asp?id=15332288
  8. Igor Kotenko, Aleksey Konovalov, Andrey Shorov. Agent-based Modeling and Simulation of Botnets and Botnet Defense. Conference on Cyber Conflict. Proceedings 2010. CCD COE Publications. Tallinn, Estonia, June 15-18, 2010. P.21-44. ISBN 978-9949-9040-1-3.
  9. Igor Kotenko, Viktor Scormin (Eds.) Computer Network Security. Lecture Notes in Computer Science, Springer-Verlag, Vol. 6258. The Fifth International Conference "Mathematical Methods, Models and Architectures for Computer Networks Security" (MMM-ACNS-2010). September 8-10, 2010, St. Petersburg, Russia. P.346. ISSN 0302-974.
  10. Igor Saenko, Igor Kotenko. Genetic Optimization of Access Control Schemes in Virtual Local Area Networks // Lecture Notes in Computer Science. 2010. . 6258 LNCS. . 209-216. DOI: 10.1007/978-3-642-14706-7_16 // https://elibrary.ru/item.asp?id=16974173
  11. Vasily Desnitsky, Igor Kotenko. Security and Scalability of Remote Entrusting Protection // Lecture Notes in Computer Science. 2010. . 6258 LNCS. . 298-306. DOI: 10.1007/978-3-642-14706-7_23 // https://www.elibrary.ru/item.asp?id=16978659
  12. Igor Kotenko, Aleksey Konovalov, Andrey Shorov. Simulation of Botnets: Agent-based approach // Studies in Computational Intelligence. 2010. . 315. . 247-252. DOI: 10.1007/978-3-642-15211-5_26 // https://www.elibrary.ru/item.asp?id=15535333
  13. Dmitry Komashinskiy, Igor Kotenko. Conceptual framework for using data mining methods to detect malicious software // Information Security. Inside. 2010. 2 (32), P.74-82. // https://www.elibrary.ru/item.asp?id=23143876 (in Russian).
  14. Igor Kotenko, Aleksey Konovalov, Andrey Shorov. Agent-oriented simulation of botnets functioning and defense against them. Information Security. Inside. 2010. 4(34), P.36-45 // https://www.elibrary.ru/item.asp?id=23143897 (in Russian).
  15. Igor Kotenko, Igor Saenko, Rafael Yusupov. International Conference "Mathematical Methods, Models and Architectures for Computer Networks Security". Information Security. Inside. 2010. 6, P.16-18. (in Russian).
  16. Dmitry Komashinskiy, Igor Kotenko, Andrey Shorov. Approach to detect malware based on postionally dependent information // Proceedings of SPIIRAS. Issue 10. St.Petersburg, Nauka, 2009. P.131-147. ISBN 978-5-02-025507-4. // https://www.elibrary.ru/item.asp?id=15512717 (in Russian).
  17. Igor Kotenko, Aleksey Konovalov, Andrey Shorov. Simulation of functioning of commands of intelligent agents of botnets and protection systems. 12th National Conference on Artificial Intelligence with International Participation (CAI-2010). Proceedings. Vol.3. September 20-24, 2010, Tver, Russia. .: Fizmatlit, 2010. P.44-51. ISBN 978-5-7995-0543-1. // https://www.elibrary.ru/item.asp?id=36294473 (in Russian).
  18. Vasiliy Desnitsky, Igor Kotenko. Development and analysis of remote entrusting protocol. VI St.Petersburg Interregional Conference Information Security of Russian Regions (IRR-2009). October 28-30, 2009. Proceedings. St.Petersburg, 2010. P.121-129. ISBN 978-5-904031-95-4. (in Russian).
  19. Vasily Desnitsky, Igor Kotenko. Software protection based on the principle of remote entrusting. 5th International Scientific Conference on Security Issues and Counter Terrorism. Lomonosov Moscow State University. October 29-30, 2009. Vol.2. The Eighth All-Russian Scientific Conference "Mathematics and Security of Information Technologies" (MSIT-09). Moscow, 2010. P.159-163. ISBN 978-5-94057-693-8. (in Russian).
  20. Dmitry Komashinskiy, Igor Kotenko. Detecting malware based on the processing of static positional information using Data Mining methods. 5th International Scientific Conference on Security Issues and Counter Terrorism. Lomonosov Moscow State University. October 29-30, 2009. Vol.2. The Eighth All-Russian Scientific Conference "Mathematics and Security of Information Technologies" (MSIT-09). Moscow, 2010. P.136-140. ISBN 978-5-94057-693-8. (in Russian).
  21. Dmitry Komashinskiy, Igor Kotenko. Combining Data Mining methods for static detection of Malware. 12th International Conference RusCrypto on Cryptology, Steganography, Digital Signature and Security Systems. Zvenigorod, Russia. April 1-4, 2010. http://www.ruscrypto.ru/ (in Russian).
  22. Y.Zozulya, I.Kotenko. Blocking Web-sites with inappropriate content based on categorization. 12th International Conference RusCrypto on Cryptology, Steganography, Digital Signature and Security Systems. Zvenigorod, Russia. April 1-4, 2010. http://www.ruscrypto.ru/ (in Russian).
  23. Aleksey Konovalov, Andrey Shorov, Igor Kotenko. Agent-oriented simulation of botnets. 12th International Conference RusCrypto on Cryptology, Steganography, Digital Signature and Security Systems. Zvenigorod, Russia. April 1-4, 2010. http://www.ruscrypto.ru/ (in Russian).
  24. Igor Kotenko. Investigation of botnets and protection mechanisms against them on the basis of agent-based simulation. IX All-Russian Conference Methods and technical tools of information security (MTTIS 2010). Proceedings. St.Petersburg, Russia. July 5-10, 2010. P.40-41. (in Russian).
  25. Vasiliy Desnitsky, Igor Kotenko. Combined mechanisms to protect software from unauthorized modifications. IX All-Russian Conference Methods and technical tools of information security (MTTIS 2010). Proceedings. St.Petersburg, Russia. July 5-10, 2010. P.100-101. (in Russian).
  26. Aleksey Konovalov, Igor Kotenko, Andrey Shorov. Simulation environment for imitating network attacks and defense mechanisms. IX All-Russian Conference Methods and technical tools of information security (MTTIS 2010). Proceedings. St.Petersburg, Russia. July 5-10, 2010. P.38-39. (in Russian).
  27. Michail Stepashkin, Igor Kotenko, Andrey Chechulin, Alexsander Tulupyev, Tatyana Tulupyeva, Anton Pashenko. Approach to security analysis of automated systems taking into account social-engineering attacks. IX All-Russian Conference Methods and technical tools of information security (MTTIS 2010). Proceedings. St.Petersburg, Russia. July 5-10, 2010. P.128-129. (in Russian).
  28. Igor Kotenko, Mikhail Stepashkin, Andrey Chechulin, Elena Doynikova, Dmitry Kotenko. Tools for security analysis of automated systems. IX All-Russian Conference Methods and technical tools of information security (MTTIS 2010). Proceedings. St.Petersburg, Russia. July 5-10, 2010. P.115-116. (in Russian).
  29. Vasiliy Desnitsky, Andrey Chechulin, Igor Kotenko. Configuration model of embedded devices. XII Saint-Petersburg International Conference Regional informatics-2010 (RI-2010). Proceedings. St. Petersburg, October 20-22, 2010. P.41-42. ISBN 978-5-904031-99-2. (in Russian).
  30. Aleksey Konovalov, Igor Kotenko. Library of modules for botnet simulation. XII Saint-Petersburg International Conference Regional informatics-2010 (RI-2010). Proceedings. St. Petersburg, October 20-22, 2010. P.110-111. ISBN 978-5-904031-99-2. (in Russian).
  31. I.V. Kotenko, I.B. Saenko, R.M. Yusupov. Analytical review of the reports of the international workshop "scientific analysis and policy support for cyber security" (SA&PS4CS 2010) // Proceedings of SPIIRAN. 2010. No. 2 (13). pp. 226-248. // https://elibrary.ru/item.asp?id=15561117 (in Russian).
  32. I.V. Kotenko, A.M. Konovalov, A.V. Shorov. Investigation of botnets and defense mechanisms on the base of simulation modeling // News of higher educational institutions. Instrumentation. 2010. Vol. 53. No. 11. pp. 42-45. // https://www.elibrary.ru/item.asp?id=15503309 (in Russian).
  33. I.V. Kotenko, I.B. Saenko, R.M. Yusupov. Analytical review of talks on the international conference "mathematical methods, models and architectures for computer network security" (MMM-ACNS-2010) // Proceedings of SPIIRAN. 2010. No. 2 (13). pp. 199-225. // https://elibrary.ru/item.asp?id=15561116 (in Russian).
  34. Igor Kotenko, Aleksey Konovalov, Andrey Shorov. Agent-oriented simulation of botnets functioning and defense against them // Information protection. Inside. 2010. No. 5 (35). pp. 56-61.// https://www.elibrary.ru/item.asp?id=23143310 (in Russian).

2009

  1. Kotenko I.V., Vorontsov V.V., Chechulin A.A., Ulanov A.V. Proactive mechanisms for defense against network worms: an approach, implementation and the results of experiments // Information Technologies. 2009. 1. . 37-42. // https://elibrary.ru/item.asp?id=11736506
  2. Igor Kotenko. Framework for Integrated Proactive Network Worm Detection and Response. Proceedings of the 17th Euromicro International Conference on Parallel, Distributed and network-based Processing (PDP 2009). Weimar, Germany. 3. February 18-20, 2009. IEEE Computer Society. 2009. P.379-386. DOI: 10.1109/PDP.2009.52 LIBRARY ID: 15295631
  3. Vasily Desnitsky, Igor Kotenko. Analysis and Design of Entrusting Protocol for Distributed Software Protection. Proceedings of the Work in Progress Session heldin connection with the 17th Euromicro International Conference on Parallel, Distributed and network-based Processing (PDP 2009). Weimar, Germany. February 2009. SEA-Publications: SEA-SR-21. 2009. P.8-9.
  4. Vasily Desnitsky, Igor Kotenko. Design of Entrusting Protocols for Software Protection // Lecture Notes in Geoinformation and Cartography. . "Information Fusion and Geographic Information Systems - Proceedings of the 4th International Workshop, IF and GIS 2009" 2009. . 301-316. DOI: 10.1007/978-3-642-00304-2_21 // https://www.elibrary.ru/item.asp?id=20547380
  5. Dmitriy Komashinskiy, Igor Kotenko. Integrated usage of data mining methods for malware detection // Lecture Notes in Geoinformation and Cartography. . "Information Fusion and Geographic Information Systems - Proceedings of the 4th International Workshop, IF and GIS 2009" 2009. . 343-357. DOI: 10.1007/978-3-642-00304-2_24 // https://www.elibrary.ru/item.asp?id=20546699
  6. Igor Kotenko. Simulation of agent teams: application of a domainindependent framework to computer network security // : Proceedings - 23rd European Conference on Modelling and Simulation, ECMS 2009. 2009. . 137-143.// https://www.elibrary.ru/item.asp?id=18094922
  7. I.V, Kotenko, V.V. Vorontsov, A.A. Chechulin, A.V. Ulanov. Proactive mechanisms for defense against network worms: an approach, implementation and the results of experiments // Information Technologies. 2009. 1. . 37-42. // https://www.elibrary.ru/item.asp?id=11736506 (in Russian).
  8. V.A. Desnitskiy, I.V. Kotenko. Methods of software protection based on the principle of remote trust // Information protection. Inside. 2009. No. 6 (30). pp. 57-61. // https://www.elibrary.ru/item.asp?id=23168407 (in Russian).
  9. Igor Kotenko, Alexander Ulanov. Multi-agent simulation of defense mechanisms against distributed computer attacks. Information Technologies, No.2, 2009. P.38-44. // https://elibrary.ru/item.asp?id=11737075 (in Russian).
  10. Igor Kotenko, Alexander Ulanov. Investigation of models of counteracting the agents in computer networks. The Multiconference Theory and Systems of Control. IV International Conference on Control Sciences (ICCS-IV). January 26-30, 2009. Moscow. 2009. (in Russian).
  11. Vasily Desnitsky, Igor Kotenko. Design and Analysis of Remote Entrusting Protocol. The 4th International Scientific Conference on Security Issues and Counter Terrorism. The Seventh All-Russian Scientific Conference "Mathematics and Security of Information Technologies" (MSIT-08). 2009. (in Russian).
  12. Andrey Chechulin, Igor Kotenko. Protection against Network Attacks by Methods of Filtering and Normalization of Transport and Network Level Protocols. The 4th International Scientific Conference on Security Issues and Counter Terrorism. The Seventh All-Russian Scientific Conference "Mathematics and Security of Information Technologies" (MSIT-08). 2009. (in Russian).
  13. Igor Kotenko, Rafael Yusupov. Information Technologies for Counteraction against Terrorism. Information Security. Inside, No.2(26), 2009. .74-79 // https://www.elibrary.ru/item.asp?id=23182566 (in Russian).
  14. Andrey Chechulin, Igor Kotenko, Artem Tishkov, Yulia Zozulya, Andrey Shorov. Methods of protection against harmful Web-sites based on reputation evaluation. 11th Conference RusCrypto on Cryptology, Steganography, Digital Signature and Security Systems. Zvenigorod, Russia. April 2-5, 2009. http://www.ruscrypto.ru/. (in Russian).
  15. Dmitry Komashinsky, Igor Kotenko, Andrey Shorov. Malware Detection based on Data Mining. 11th Conference RusCrypto on Cryptology, Steganography, Digital Signature and Security Systems. Zvenigorod, Russia. April 2-5, 2009. http://www.ruscrypto.ru/ (in Russian).
  16. Vasily Desnitsky, Igor Kotenko. Approach to Software Protection based on Remote Entrusting Mechanism. 11th Conference RusCrypto on Cryptology, Steganography, Digital Signature and Security Systems. Zvenigorod, Russia. April 2-5, 2009. http://www.ruscrypto.ru/. (in Russian).
  17. Igor Kotenko. Network cat-and-mouse: wars of adaptive software agents. 11th Conference RusCrypto on Cryptology, Steganography, Digital Signature and Security Systems. Zvenigorod, Russia. April 2-5, 2009. http://www.ruscrypto.ru/ (in Russian).
  18. Sergey Reznik, Igor Kotenko. Methods and Tools of verification for integrated analysis of security protocols. Information Security. Inside, No.3(27), 2009. P.56-72. // https://elibrary.ru/item.asp?id=23181772 (in Russian).
  19. Andrey Shorov, Alexei Konovalov, Igor Kotenko. Investigative Simulation of Botnets and Defence Mechanisms against them. VIII All-Russian Conference Methods and technical tools of information security (MTTIS 2009). Proceedings. St.Petersburg, Russia. June 29 - July 2, 2009. P.132. (in Russian).
  20. Dmitry Komashinsky, Igor Kotenko, Andrey Shorov. Malware Detection Technology based on Data Mining. VIII All-Russian Conference Methods and technical tools of information security (MTTIS 2009). Proceedings. St.Petersburg, Russia. June 29 - July 2, 2009. P.122-123. (in Russian).
  21. Igor Kotenko. Simulation of Defence Processes against Attacks on Infrastructure. VIII All-Russian Conference Methods and technical tools of information security (MTTIS 2009). Proceedings. St.Petersburg, Russia. June 29 - July 2, 2009. P.63. (in Russian).
  22. Kotenko I.V., Reznik S.A., Shorov A.V. Security protocols verification combining existing approaches and tools. Proceedings of SPIIRAN. 2009. No. 8. pp. 292-310. // https://elibrary.ru/item.asp?id=15512754 (in Russian).
  23. Igor Kotenko. Design and Functioning Support of Intelligent Information Security Systems. VI St.Petersburg Interregional Conference Information Security of Russian Regions (ISRR-2009). October 28-30, 2009. Proceedings. St.Petersburg, 2009. P.112. (in Russian).
  24. Igor Kotenko. Multi-agent modeling for the study of information security mechanisms in the internet // In the collection: Simulation modeling. Theory and practice. Plenary reports. 2009. pp. 38-47. // https://www.elibrary.ru/item.asp?id=36274501 (in Russian).
  25. Vasily Desnitsky, Igor Kotenko. Performance and Scalability of Remote Entrusting Protection. Second International Workshop on Remote Entrusting (RE-TRUST 2009). September 30 - October 1, 2009. Riva del Garda, Italy, 2009.
  26. Igor Kotenko, Bogdanov V. Proactive Monitoring of Security Policy Accomplishment in Computer Networks. Proceedings of IEEE Fourth International Workshop on "Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications" (IDAACS'2009). Rende (Cosenza), Italy, September 21-23, 2009. . 364-369. DOI: 10.1109/IDAACS.2009.5342961 // https://www.elibrary.ru/item.asp?id=15340173
  27. Michail Stepashkin, Igor Kotenko. Security analysis of computer networks ans systems based on building of attack trees. The St.Petersburg Scientific Forum Science and Society. Information technologies. Forth St.Petersburg Meeting of the Nobel Prize laureates. Proceedings. St.Petersburg. 2009. P.363-366. (in Russian).
  28. Igor Kotenko, Rafael Yusupov. Counteraction to cyber terrorism: actual problems and perspective research directions. The St.Petersburg Scientific Forum Science and Society. Information technologies. Forth St.Petersburg Meeting of the Nobel Prize laureates. Proceedings. St.Petersburg. 2009. P.329-332. (in Russian).
  29. Igor Kotenko. Intelligent mechanisms of protection against malware propagation. International Conferences Intelligent systems (AIS 2009) and Intelligent CAD (CAD-2009). Proceedings. Divnomorskoe, Russia. September 3-10, 2008. Vol.2. Moscow, Fizmatlit, 2009. P.431-438. (in Russian).
  30. Igor Kotenko. Intelligent mechanisms of cyber security management. Risks and security management. Proceedings of Institute of System Analysis of Russian Academy of Science. Vol.41, Moscow, URSS, 2009. P.74-103.// https://elibrary.ru/item.asp?id=15284552 (in Russian).
  31. Igor Kotenko, Vasily Desnitsky. Aspect-oriented implementation of the remote trust-based software protection model. Information Technologies and Computing Systems, 4, 2009. P.67-76. // https://www.elibrary.ru/item.asp?id=13090468 (in Russian).
  32. Andrey Chechulin, Igor Kotenko. Detection and Counteraction of Network Attacks based on Combined Mechanisms of Traffic Analysis // Methods and technical means of ensuring information security. 2009. No. 18. p. 69. // https://www.elibrary.ru/item.asp?id=49913421 (in Russian).
  33. D.V. Komashinsky, I.V. Kotenko. Detection of malicious software based on static information processing by data mining methods // Proceedings of the Institute of System Analysis of the Russian Academy of Sciences. 2009. Vol. 51. pp. 65-84. // https://www.elibrary.ru/item.asp?id=25794062 (in Russian).

2008

  1. Igor Kotenko. Multi-agent modeling and the simulation of computer network security processes: a game of network cats and mice. NATO Science for Peace and Security Series, D: Information and Communication Security. Volume 17, 2008. Aspects of Network and Information Security. P.56-73. ISBN 978-1-58603-856-4.
  2. Igor Kotenko. Multi-agent Simulation of Attacks and Defense Mechanisms in Computer Networks // International Journal of Computing. 2008. . 7. 2. . 35-43.// https://www.elibrary.ru/item.asp?id=36299599
  3. Igor Kotenko, Alexander Ulanov. Packet Level Simulation of Cooperative Distributed Defense against Internet Attacks // : Proceedings of the 16th Euromicro Conference on Parallel, Distributed and Network-Based Processing, PDP 2008. 16th Euromicro Conference on Parallel, Distributed and Network-Based Processing, PDP 2008. sponsors: Sun Microsystems, Mairie de Toulouse, Centre National de la Recherche Scientifique, SGI, CNRS-LAAS. Toulouse, 2008. . 565-572. DOI: 10.1109/PDP.2008.65 // https://elibrary.ru/item.asp?id=15099260
  4. Alexander Ulanov, Igor Kotenko. Simulation of Adaptable Agent Teams in Internet. Workshop on Logics for Agents and Mobility (LAM'08). The European Summer School on Logic, Language and Information (ESSLLI 2008), Hamburg, Germany. 4 - 15 August, 2008. P.67-79.
  5. Vasily Desnitsky, Igor Kotenko, Sergey Reznik. Design and Verification of message exchange protocol for software protection based on Remote Entrusting mechanism // Information Security. Inside, No.5(23), 2008. P.68-74. // https://elibrary.ru/item.asp?id=23274066 (in Russian).
  6. Vasily Desnitsky, Igor Kotenko, Sergey Reznik. Design and Verification of message exchange protocol for software protection based on Remote Entrusting mechanism // Information Security. Inside, No.4(22), P.59-63, 2008. // https://elibrary.ru/item.asp?id=23274050 (in Russian).
  7. Igor Kotenko, Victor Vorontsov, Artem Tishkov, Andrey Chechulin, Alexander Ulanov. Investigation of Proactive Protection Mechanisms against Network Worms. Third International Scientific Conference on Security Issues and Counter Terrorism "Problems of Security and Counter Terrorism". Materials. Moscow State University. 2008. P.278-283. (in Russian).
  8. Alexander Ulanov, Igor Kotenko. Simulation of Cooperative Mechanisms for Defense of Computer Networks. Third International Scientific Conference on Security Issues and Counter Terrorism "Problems of Security and Counter Terrorism". Materials. Moscow State University. 2008. P.266-271. (in Russian).
  9. Igor Kotenko, Rafael Yusupov. Actual Research in Computer Network and System Security. V Interregional Conference Information Security of Russian Regions (ISRR-2007). Selected Proceedings. St.Petersburg, 2008. P.21-31.// https://www.elibrary.ru/item.asp?id=36398162 (in Russian).
  10. Vasily Desnitsky, Igor Kotenko. Model of Software Protection based on Remote Retrusting Mechanism. V Interregional Conference Information Security of Russian Regions (ISRR-2007). Selected Proceedings. St.Petersburg, 2008. P.172-177. (in Russian).
  11. Igor Kotenko, Alexander Ulanov. Investigation of Protection Mechanisms against DDoS Attacks: Imitation of Counteraction between Intelligent Agents in the Internet. 10th Conference RusCrypto on Cryptology, Steganography, Digital Signature and Security Systems. Zvenigorod, Russia. April 3-5, 2008. CD ROM. http://www.ruscrypto.ru/. (in Russian).
  12. Igor Kotenko. Proactive Protection Mechanisms against rapidly propagating Network Worms. 10th Conference RusCrypto on Cryptology, Steganography, Digital Signature and Security Systems. Zvenigorod, Russia. April 3-5, 2008 CD ROM. http://www.ruscrypto.ru/. (in Russian).
  13. Vasily Desnitsky, Igor Kotenko. Software protection model based on remote entrusting mechanism. News of High schools. Journal of Instrument Engineering, Vol.51, 11, 2008. P.26-31. ISSN 0021-3454.// https://elibrary.ru/item.asp?id=11675981 (in Russian).
  14. Victor Vorontsov, Igor Kotenko. Analysis of credit based mechanism of network worm epidemics detection and containment. News of High schools. Instrument making, Vol.51, No.11, 2008. P.21-26. ISSN 0021-3454. // https://www.elibrary.ru/item.asp?id=11675980 (in Russian).
  15. Ekaterina Sidelnikova, Artem Tishkov, Igor Kotenko. Filtering Policy Verification based on Event Calculus and Abduction Reasoning // News of higher educational institutions. Instrumentation. 2008. Vol. 51. No. 11. pp. 31-36. ISSN 0021-3454. // https://elibrary.ru/item.asp?id=11675982 (in Russian).
  16. Olga Polubelova, Igor Kotenko. Verification of Filtering Rules of Security Policy by Model Checking. News of High schools. Instrument making, Vol.51, No.12, 2008. P.44-49. ISSN 0021-3454. (in Russian).
  17. Andrey Chechulin, Igor Kotenko. Investigation of Virus Throttling Defense Mechanisms against Network Worms // Information protection. Inside. 2008. No. 3 (21). pp. 68-73.// https://www.elibrary.ru/item.asp?id=23274038 (in Russian).
  18. Vasily Desnitsky, Igor Kotenko, Sergey Reznik. Design and Analysis of message exchange protocol for software protection based on Remote Entrusting. VII All-Russian Conference Methods and technical tools of information security (MTTIS 2008). Proceedings. St.Petersburg, Russia. June 27-29, 2008. (in Russian).
  19. Igor Kotenko, Victor Vorontsov, Andrey Chechulin. Detection and Containment of Spreading malware by means of combined protection mechanisms. VII All-Russian Conference Methods and technical tools of information security (MTTIS 2008). Proceedings. St.Petersburg, Russia. June 27-29, 2008. (in Russian).
  20. Igor Kotenko, Artem Tishkov, Victor Vorontsov. Combining of malware protection mechanisms. International Conferences Intelligent systems (AIS 2008) and Intelligent CAD (CAD-2008). Proceedings. Divnomorskoe, Russia. September 3-10, 2008. Moscow, Fizmatlit, 2008. (in Russian).
  21. Vasily Desnitsky, Igor Kotenko, Sergey Reznik. Design and Analysis of message exchange protocol for Remote Entrusting mechanism. International Conferences Intelligent systems (AIS 2008) and Intelligent CAD (CAD-2008). Proceedings. Divnomorskoe, Russia. September 3-10, 2008. Moscow, Fizmatlit, 2008. (in Russian).
  22. Igor Kotenko, Alexander Ulanov. Simulation of adaptation of counteracting intelligent agent teams. XI National Conference on Artificial Intelligence with International Participation (NCAI-2008). Proceedings. Vol.1. Dubna, Russia. September 29 October 3, 2008. .: URSS, 2008. P.32-40. ISBN 978-5-9710-0226-0 // https://www.elibrary.ru/item.asp?id=36438688 (in Russian).
  23. Igor Kotenko, Rafael Yusupov. Information Technologies for Terrorism Counteraction. XI International Conference Regional informatics-2008 (RI-2008). Proceedings. St. Petersburg, October 21-23, 2008. P.39-40. // https://www.elibrary.ru/item.asp?id=29123905 (in Russian).
  24. Andrey Shorov, Igor Kotenko. Protection of the computer network from infrastructure attacks based on the implementation of the " nervous system of the network". XI International Conference Regional informatics-2008 (RI-2008). Proceedings. St. Petersburg, October 21-23, 2008. P.118-119. // https://www.elibrary.ru/item.asp?id=35435931 (in Russian).
  25. Igor Kotenko, Victor Vorontsov, Andrey Chechulin. Analysis of Network Worm Detection and Containment Mechanisms. V Interregional Conference Information Security of Russian Regions (ISRR-2007). Selected Proceedings. St.Petersburg, 2008. P.113-119. (in Russian).
  26. Dmitriy Komashinskiy, Igor Kotenko. Research of proactive mechanisms of malware detection based on data mining methods // Mathematics and Security of Information Technologies. 2008. P. 226-231. // https://www.elibrary.ru/item.asp?id=43951860 (in Russian).
  27. O.V. Polubelova, I.V. Kotenko. Verification of filtering rules of security policy by model checking // Izvestia of Higher educational institutions. Instrumentation. 2008. Vol. 51. No. 12. pp. 44-50. // https://elibrary.ru/item.asp?id=11676000 (in Russian).

2007

  1. Igor Kotenko, Alexander Ulanov. Agent-oriented environment for modelling and estimation of protection gears from distributed attacks "failure in service" // News of higher educational institutions. Instrumentation. 2007. Vol. 50. No. 1. pp. 18-21. // https://elibrary.ru/item.asp?id=9336953 (in Russian).
  2. Igor Kotenko, Rafael Yusupov. Computer security Technologies. Herald of the Russian Academy of Sciences, Vol.77, 4, 2007. P.323-333. // https://www.elibrary.ru/item.asp?id=9535364 (in Russian).
  3. Igor Kotenko, Alexander Ulanov. Multiagent simulation of protection of information resources in internet. Herald of the Russian Academy of Sciences.Journal of Computer and Systems Sciences International, 5, 2007, P.74-88. // https://elibrary.ru/item.asp?id=9534164 (in Russian).
  4. Igor Kotenko, Artem Tishkov, Olga Chervatuk, Sergey Reznik, Ekaterina Sidelnikova. System of Verification of Computer Network Security Policy. Herald of computer and information technologies, 11(41), 2007. P.48-56. // https://elibrary.ru/item.asp?id=12980333 (in Russian).
  5. Igor Kotenko, Alexander Ulanov. Modeling and Simulation of Adaptive Cooperative Defense against Computer Attacks in the Internet. Proceedings of Institute of System Analysis of Russian Academy of Science. Moscow, URSS, 2007. Vol.31, .103-125 // https://elibrary.ru/item.asp?id=11580233 (in Russian).
  6. Igor Kotenko, Mikhail Stepashkin. Security analysis of computer networks on the basis of modeling the actions of intruders and building a graph of attacks // Proceedings of the Institute of System Analysis of the Russian Academy of Sciences. 2007. Vol. 31. pp. 126-207. // https://elibrary.ru/item.asp?id=11580234 (in Russian).
  7. Alexander Ulanov, Igor Kotenko. Defense against DDoS Attacks: Mechanisms of Prevention, Detection, Source Tracking and Counteraction // Information Security. Inside. 2007. 2007. No. 3 (15). pp. 62-69.// https://elibrary.ru/item.asp?id=23369788 (in Russian).
  8. Vitaly Bogdanov, Igor Kotenko. Proactive Monitoring of Security Policy Performance in Computer Networks // Information Security. Insider. 2007. No. 4 (16). pp. 66-72. // https://www.elibrary.ru/item.asp?id=23369804 (in Russian).
  9. Igor Kotenko, Alexander Ulanov. Computer Wars in the Internet: Modeling and Simulation of Program Agents Counteraction. Information Security. Inside, 4(16), 2007,P.38-45. // https://www.elibrary.ru/item.asp?id=23369799 (in Russian).
  10. Igor Kotenko. Automatic Detection and Constraining of Internet Worm Propagation: Brief Analysis of Modern Research. Information Security. Inside, No. 4(16), 2007. P.46-56.// https://www.elibrary.ru/item.asp?id=23369801 (in Russian).
  11. Igor Kotenko. International Conference Mathematical Methods, Models and Architectures for Computer Networks Security (MMMACNS-07). Information Security. Inside, No. 3, 2007, P.12; No. 4, 2007, P.56. (in Russian).
  12. Igor Kotenko, Artem Tishkov, Ekaterina Sidelnikova, Olga Chervatuk. Checking of Security Policy Rules for Corporate Computer Networks // Information protection. Insider. 2007. No. 6(18), pp.52-59.// https://elibrary.ru/item.asp?id=23375471 (in Russian).
  13. Igor Kotenko, Victor Vorontsov. Analytical Models of Network Worm Propagation // Proceedings of SPIIRAS. Issue 4, St.Petersburg, Nauka, 2007. P.208-224. // https://www.elibrary.ru/item.asp?id=15561049 (in Russian).
  14. Igor Kotenko, Victor Vorontsov, Alexander Ulanov. Models and Systems of Network Worm Propagation Simulation. Proceedings of SPIIRAS. Issue 4, St.Petersburg, Nauka, 2007. P.225-238. // https://elibrary.ru/item.asp?id=15561050 (in Russian).
  15. Igor Kotenko. Actual Issues of Modeling and Simulation of Information Security Processes on the basis of Technology of Intelligent Agents. Transactions of Saint Petersburg Electrotechnical University LETI (ETU). Special issue. Information science problems: philosophy, sociology of science, education. St.Petersburg, SPbETU LETI, 2007. P.93-109. (in Russian).
  16. Vitaly Bogdanov, Igor Kotenko. The Proactive Approach to Monitoring of Computer Network Policy. Second International Scientific Conference on Security Issues and Counter Terrorism "Problems of Security and Counter Terrorism". Materials. Moscow State University. 2007. P.373-382. (in Russian).
  17. Artem Tishkov, Igor Kotenko, Ekaterina Sidelnikova, Olga Chervatuk. Detection and Resolution of Conflicts in Security Policies. Second International Scientific Conference on Security Issues and Counter Terrorism "Problems of Security and Counter Terrorism". Materials. Moscow State University. 2007. P.172-185. // https://elibrary.ru/item.asp?id=43951864 (in Russian).
  18. Igor Kotenko, Mikhail Stepashkin. Evaluating the Computer Network Security on the Basis of Attack Graph Analysis. Second International Scientific Conference on Security Issues and Counter Terrorism "Problems of Security and Counter Terrorism". Materials. Moscow State University. 2007. P.466-481. // https://elibrary.ru/item.asp?id=43956792 (in Russian).
  19. Vitaly Bogdanov, Igor Kotenko, Mikhail Stepashkin. Proactive Approach to Network Security Policy Monitoring. Proceedings of the International Security and Counteracting Terrorism Conference. Moscow. Lomonosov Moscow State University Intellectual Center. 2007. 4 p.
  20. Mikhail Stepashkin, Igor Kotenko, Vitaly Bogdanov. Network Security Evaluation based on Analysis of Attack Graphs. Proceedings of the International Security and Counteracting Terrorism Conference. Moscow. Lomonosov Moscow State University Intellectual Center. 2007. 5 p.
  21. Artem Tishkov, Igor Kotenko, Ekaterina Sidelnikova, Olga Chervatuk. Detection and Resolution of Inconsistencies in Security Policy. Proceedings of the International Security and Counteracting Terrorism Conference. Moscow. Lomonosov Moscow State University Intellectual Center. 2007. 5 p.
  22. Igor Kotenko, Alexander Ulanov. Confrontation in the Internet: Simulation of Counteraction to Distributed Cyber-Attacks. Proceedings of the International Security and Counteracting Terrorism Conference. Moscow. Lomonosov Moscow State University Intellectual Center. 2007. 4 p.
  23. Igor Kotenko, Artem Tishkov, Olga Chervatuk, Ekaterina Sidelnikova. Security Policy Verification Tool for Geographical Information Systems // Lecture Notes in Geoinformation and Cartography. . "Information Fusion and Geographic Information Systems - Proceedings of the 3rd International Workshop, IF and GIS 2007" 2007. . 128-146. DOI: 10.1007/978-3-540-37629-3_9 // https://elibrary.ru/item.asp?id=20677670
  24. Julien Bourgeois, Abdoul Karim Ganame, Igor Kotenko, Alexander Ulanov. Software Environment for Simulation and Evaluation of a Security Operation Center // : Lecture Notes in Geoinformation and Cartography. . "Information Fusion and Geographic Information Systems - Proceedings of the 3rd International Workshop, IF and GIS 2007" 2007. . 111-127. DOI: 10.1007/978-3-540-37629-3_8 // https://elibrary.ru/item.asp?id=20677673
  25. Igor Kotenko, Alexander Ulanov. Multi-agent Framework for Simulation of Adaptive Cooperative Defense against Internet Attacks // Lecture Notes in Computer Science. 2007. . 4476 LNAI. . 212-228. DOI: 10.1007/978-3-540-72839-9_18 // https://elibrary.ru/item.asp?id=13536467
  26. Igor Kotenko, Alexander Ulanov. Agent-based Simulation Environment and Experiments for Investigation of Internet Attacks and Defense Mechanisms // 21st European Conference on Modelling and Simulation: Simulations in United Europe, ECMS 2007. 2007. . 146-155. DOI: 10.7148/2007-0146 // https://elibrary.ru/item.asp?id=18099297
  27. Igor Kotenko, Olga Chervatuk, Ekaterina Sidelnikova, Artem Tishkov. Hybrid Multi-module Security Policy Verification // Proceedings - Eighth IEEE International Workshop on Policies for Distributed Systems and Networks, POLICY 2007. 8th IEEE International Workshop on Policies for Distributed Systems and Networks, POLICY 2007. sponsors: EMANICS. Bologna, 2007. . 277. DOI: 10.1109/POLICY.2007.25 // https://elibrary.ru/item.asp?id=15051139
  28. Vitaly Bogdanov, Igor Kotenko. Proactive Monitoring of Performance of Computer Network Security Policy. VI All-Russian Conference Methods and technical tools of information security (MTTIS 2007). June 27-29, 2007. St. Petersburg, Proceedings. SPbSPU. 2007. P.32. (in Russian).
  29. Igor Kotenko, Victor Vorontsov, Alexander Ulanov. Proactive Detection and Constraining of Network Worm Propagation. VI All-Russian Conference Methods and technical tools of information security (MTTIS 2007). June 27-29, 2007. St. Petersburg, Proceedings. SPbSPU. 2007. P.91. (in Russian).
  30. Igor Kotenko, Alexander Ulanov. Simulation of Adaptive Opposition of Defense Systems to Distributed Attacks. VI All-Russian Conference Methods and technical tools of information security (MTTIS 2007). June 27-29, 2007. St. Petersburg, Proceedings. SPbSPU. 2007. P.92. (in Russian).
  31. Igor Kotenko, Alexander Ulanov. Investigation of Cooperative Defense against DDoS // SECRYPT 2007 - International Conference on Security and Cryptography, Proceedings. SECRYPT 2007 - International Conference on Security and Cryptography. . "SECRYPT 2007 - Proceedings of the International Conference on Security and Cryptography" sponsors: Workflow Management Coalition (WfMC). Barcelona, 2007. . 180-183. // https://elibrary.ru/item.asp?id=15051849
  32. Igor Kotenko, Victor Vorontsov. Proactive Approach to Detection and Restraining of Network Worms. International Conferences Intelligent systems (AIS'07) and Intelligent CAD (CAD-2007). Proceedings.Moscow, Fizmatlit, 2007. Moscow, Fizmatlit, 2007. P.61-68. (in Russian).
  33. Vasily Desnitsky, Igor Kotenko. Models of Remote Authentication for Software Protection. International Conferences Intelligent systems (AIS'07) and Intelligent CAD (CAD-2007). Proceedings.Moscow, Fizmatlit, 2007. P.43-50. (in Russian).
  34. Igor Kotenko. Multi-agent Modelling and Simulation of Cyber-Attacks and Cyber-Defense for Homeland Security // : 2007 4th IEEE Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, IDAACS. EEEE, 2007. . 614-619. DOI: 10.1109/IDAACS.2007.4488494 // https://www.elibrary.ru/item.asp?id=15049284
  35. Vladimir Gorodetsky, Igor Kotenko, Victor Skormin (Eds.). The Forth International Conference Mathematical Methods, Models and Architectures for Computer Networks Security (MMM-ACNS 2007). St. Petersburg, Russia, September 1315, 2007. Communications in Computer and Information Science (CCIS). Springer. . Vol.1, 2007. 416 .
  36. Vitaly Bogdanov, Igor Kotenko. Policy-based Proactive Monitoring of Security Policy Performance // Communications in Computer and Information Science. 2007. . 1. . 197-212. DOI: 10.1007/978-3-540-73986-9_17 // https://www.elibrary.ru/item.asp?id=20679083
  37. Artem Tishkov, Ekaterina Sidelnikova, Igor Kotenko. Event Calculus based Checking of Filtering Policies. Communications in Computer and Information Science. 2007. Vol. 1. . 248-253. DOI: 10.1007/978-3-540-73986-9_21 // https://elibrary.ru/item.asp?id=20679090
  38. Igor Kotenko. Models and Methods of Construction and Support of Functioning of Intelligent Adaptive Security Systems // Mathematical methods of pattern recognition. 2007. Vol. 13. No. 1. pp. 599-602. // https://www.elibrary.ru/item.asp?id=29129788 (in Russian).
  39. Alexander Ulanov, Igor Kotenko. Multiagent Environment for Carrying out of Experiments on Protection of Computer Networks // Mathematical methods of pattern recognition. 2007. Vol. 13. No. 1. pp. 631-634. // https://elibrary.ru/item.asp?id=29129798 (in Russian).
  40. Igor Kotenko, Victor Vorontsov. Use of Proactive Approach for Protection against Network Worms. Scientific-practical Symposium National Information Systems and State Security. Proceedings. Moscow, Russia. September 2007. P.78-81. (in Russian).
  41. Vasily Desnitsky, Igor Kotenko. Remote Authentication for Protection of Programs against Non-authorized Modification. Scientific-practical Symposium National Information Systems and State Security. Proceedings. Moscow, Russia. September 2007. P.81-84. (in Russian).
  42. Alexander Ulanov, Igor Kotenko. Simulation of Adaptive Cooperative Strategies of Defense against Internet Attacks. The third All-Russian Scientific and practical conference on simulation modeling and its application in science and industry "Simulation modeling. Theory and Practice" (IMMOD-2007). St. Petersburg, October 17-19, 2007. Collection of reports. St. Petersburg: FSUE Central Research Institute of Shipbuilding Technology. 2007. Volume II. C.211-215. // https://elibrary.ru/item.asp?id=49432666 (in Russian).
  43. Igor Kotenko, Alexander Ulanov, Artem Tishkov, Vitaly Bogdanov, Victor Vorontsov, Andrey Chechulin. Simulation of Network Worm Detection and Containment in Computer Networks. The Third All-Russian Scientific-practical Conference on Simulation and its Application in Science and Industry Simulation. Theory and Practice (IMMOD-2005). St.Petersburg, Russia. October 17-19, 2007. Proceedings. St.Petersburg, 2007. Vol.II. P.106-109. (in Russian).
  44. Igor Kotenko, Rafael Yusupov. Actual Issues and Solutions in the Field of Protection of Computer Networks and Systems. V St.Petersburg Interregional Conference Information Security of Russian Regions (ISRR-2007). St.Petersburg, Russia. October 23-25, 2007. Conference Proceedings. St.Petersburg, 2007. P.55-56. // https://www.elibrary.ru/item.asp?id=36397747 (in Russian).
  45. Artem Tishkov, Igor Kotenko. Computer Network Protection System based on Security Policy. V St.Petersburg Interregional Conference Information Security of Russian Regions (ISRR-2007). St.Petersburg, Russia. October 23-25, 2007. Conference Proceedings. St.Petersburg, 2007. P.122-123. (in Russian).
  46. Vasily Desnitsky, Igor Kotenko. Model of Protecting the Programs against Non-authorized Changes on the Basis of Remote Trust Mechanism. V St.Petersburg Interregional Conference Information Security of Russian Regions (ISRR-2007). St.Petersburg, Russia. October 23-25, 2007. Conference Proceedings. St.Petersburg, 2007. P.81. // https://www.elibrary.ru/item.asp?id=35099930 (in Russian).
  47. Victor Vorontsov, Igor Kotenko. Models of detection and containment of network worms on the basis of proactive approach. V St.Petersburg Interregional Conference Information Security of Russian Regions (ISRR-2007). St.Petersburg, Russia. October 23-25, 2007. Conference Proceedings. St.Petersburg, 2007. P.47-48. // https://www.elibrary.ru/item.asp?id=35461514 (in Russian).
  48. Andrey Chechulin, Igor Kotenko. Mechanisms of protection against network worms on the basis of threshold random walk method. V St.Petersburg Interregional Conference Information Security of Russian Regions (ISRR-2007). St.Petersburg, Russia. October 23-25, 2007. Conference Proceedings. St.Petersburg, 2007. P.70.// https://www.elibrary.ru/item.asp?id=29391109 (in Russian).
  49. V. Gorodetsky, I.V. Kotenko, V.A. Skormin. Computer network security: Fourth international conference on mathematical methods, models, and architectures for computer network security, MMM-ACNS 2007 St. Petersburg, russia, september 13-15, 2007 proceedings // Communications in Computer and Information Science. 2007. . 1. // https://www.elibrary.ru/item.asp?id=20679095
  50. A.V. Ulanov, I.V. Kotenko. Protection from DDoS attacks: mechanisms of prevention, detection, source tracking and counteraction // Information Security. Inside. 2007. No. 1 (13). pp. 60-67. // https://elibrary.ru/item.asp?id=23369760 (in Russian).
  51. A.V. Ulanov, I.V. Kotenko. Protection from DDOS attacks: mechanisms of prevention, detection, source tracking and counteraction // Information Security. Inside. 2007. No. 2 (14). pp. 70-77. // https://elibrary.ru/item.asp?id=23369775 (in Russian).
  52. Vitaly Bogdanov, Igor Kotenko. Proactive Monitoring of Security Policy Performance in Computer Networks. Information Security. Insider, No. 3(15), 2007, pp.42-47 // https://www.elibrary.ru/item.asp?id=23369785 (in Russian).
  53. Igor Kotenko, Artem Tishkov, Ekaterina Sidelnikova, Olga Chervatuk. Checking of Security Policy Rules for Corporate Computer Networks // Information Security. Inside, No. 5, 2007. P.46-49; No. 6, 2007. // https://www.elibrary.ru/item.asp?id=23369814 (in Russian).

2006

  1. Igor Kotenko, Mikhail Stepashkin, Vitaly Bogdanov. Architectures and models of active vulnerabilities analysis based on simulation of malefactors' actions. Problems of information security. Computer systems. 2006, 2, .7-24. // https://elibrary.ru/item.asp?id=11626042 (in Russian).
  2. I.V. Kotenko, A.V. Ulanov. Modeling the confrontation of software agents on the Internet: a general approach, modeling environment and experiments // Information protection. Insider. 2006. No. 5 (11). pp. 48-56. // https://elibrary.ru/item.asp?id=23412858 (in Russian).
  3. Igor Kotenko, Mikhail Stepashkin, Alexander Ulanov. Agent-based modeling and simulation of malefactors' attacks against computer networks. Security and Embedded Systems. D.N.Serpanos, R.Giladi (Eds.). IOS Press. 2006. P.139-146. ISSN 1574-5589.
    NATO-ASI-06-Cover.jpg [image/jpeg] (168841 bytes)
    NATO-ASI-06-paper.pdf [application/pdf] (187094 bytes)
  4. Igor Kotenko, Mikhail Stepashkin. Systems-simulators: assignment, functioning, architecture and approach to implementation // Journal of Instrument Engineering, Vol.49, 3, 2006, P.3-9. // https://elibrary.ru/item.asp?id=9161583 (in Russian).
  5. Igor Kotenko, Mikhail Stepashkin, Vitaly Bogdanov. Vulnerability Analysis of Computer Networks on Design Stages and Maintenance // News of higher educational institutions. Instrumentation. 2006. Vol. 49. No. 5. pp. 3-8. // https://elibrary.ru/item.asp?id=9210071 (in Russian).
  6. Igor Kotenko, Rafael Yusupov. Perspective directions of research in computer security field. Information Security. Inside, 2 (8), 2006. P.46-57. // https://elibrary.ru/item.asp?id=23378854 (in Russian).
    inside-zi.2-Cover.jpg [image/jpeg] (438236 bytes)
    inside-zi.2-Paper.pdf [application/pdf] (1312129 bytes)
  7. Igor Kotenko, Mikhail Stepashkin. Security metrics for estimating the security level of computer networks on the basis of constructing attack graphs. Information Security. Inside, 2006, 3(9), P.36-45. // https://elibrary.ru/item.asp?id=23409300 (in Russian).
    inside-zi.3-Cover.jpg [image/jpeg] (415428 bytes)
    inside-zi.3-Paper.pdf [application/pdf] (1109875 bytes)
  8. Igor Kotenko, Alexander Ulanov. Simulation of "network cats and mice" game: multiagent technologies for research of cyber-counteraction between antagonistic teams of cyber-agents in the Internet. AI News, 3, 2006. // https://elibrary.ru/item.asp?id=50331825 (in Russian).
  9. Igor Kotenko, Alexander Ulanov. Software testbed and experiments for exploring counteraction of attack and defense agents in the Internet. International Security and Counteracting Terrorism Conference. Moscow.Proceedings. Lomonosov Moscow State University Intellectual Center. 2006. P.80-93. (in Russian).
    ISCTC-06-Cover.jpg [image/jpeg] (87507 bytes)
    ISCTC-06-paper1.pdf [application/pdf] (335656 bytes)
  10. Igor Kotenko, Artem Tishkov, Olga Chervatuk. Architecture and Models for Security Policy Verification. International Security and Counteracting Terrorism Conference. Moscow.Proceedings. Lomonosov Moscow State University Intellectual Center. 2006. P. 191-197 // https://elibrary.ru/item.asp?id=44523647 (in Russian).
    ISCTC-06-paper2.pdf [application/pdf] (221722 bytes)
  11. Igor Kotenko, Alexander Ulanov. Agent-based Simulation of Distributed Defense against Computer Network Attacks // Proceedings of 20th European Conference on Modelling and Simulation: Modelling Methodologies and Simulation Key Technologies in Academia and Industry, ECMS 2006. 2006. . 560-565. DOI: 10.7148/2006-0560 // https://elibrary.ru/item.asp?id=18102226
    ECMS-06-Cover.jpg [image/jpeg] (496519 bytes)
    ECMS-06-Paper.pdf [application/pdf] (381970 bytes)
  12. Igor Kotenko, Alexander Ulanov. Antagonistic Agents in the Internet: Computer Network Warfare Simulation // : 2006 9th International Conference on Information Fusion, FUSION. Florence, 2006. . 4085991. DOI: 10.1109/ICIF.2006.301705 // https://elibrary.ru/item.asp?id=15048026
    Fusion2006-Paper.pdf [application/pdf] (446339 bytes)
  13. Igor Kotenko, Mikhail Stepashkin. Network security evaluation based on simulation of malfactor's behavior // SECRYPT 2006 - International Conference on Security and Cryptography, Proceedings. International Conference on Security and Cryptography, SECRYPT 2006. sponsors: IBM, Polytechnic Institute of Setubal. Setubal, 2006. . 339-344. // https://elibrary.ru/item.asp?id=15291947
    Secrypt-06-Cover.jpg [image/jpeg] (339392 bytes)
    Secrypt-06-Paper.pdf [application/pdf] (1171216 bytes)
  14. Igor Kotenko, Alexander Ulanov. Agent-based modeling and simulation of network softbots' competition. Knowledge-Based Software Engineering. Proceedings of the Seventh Joint Conference on Knowledge-Based Software Engineering (JCKBSE'06). Tallinn, Estonia. August 28-31. 2006. IOS Press, 2006. P.243-252.
    JKBSE-06-Cover.jpg [image/jpeg] (429831 bytes)
    JKBSE-06-Paper.pdf [application/pdf] (640629 bytes)
  15. Igor Kotenko, Alexander Ulanov. Simulation of Internet DDoS Attacks and Defense // Lecture Notes in Computer Science. 2006. . 4176 LNCS. . 327-342. DOI: 10.1007/11836810_24 // https://elibrary.ru/item.asp?id=13510558
    ISC-06-Cover.jpg [image/jpeg] (362983 bytes)
    ISC-06-Paper.pdf [application/pdf] (669099 bytes)
  16. Igor Kotenko, Mikhail Stepashkin. Analyzing network security using malefactor action graphs. International Journal of Computer Science and Network Security. 2006. . 6. 6. . 226-235. // https://elibrary.ru/item.asp?id=36459385
    IJCSNS-06-06-Cover.jpg [image/jpeg] (235118 bytes)
    IJCSNS-06-06-Paper.pdf [application/pdf] (378933 bytes)
  17. Igor Kotenko, Alexander Ulanov. Simulation Environment for Investigation of Cooperative Distributed Attacks and Defense. 9th International Symposium on Recent Advances in Intrusion Detection. RAID 2006. Abstract and Poster sessions. Hamburg, Germany September 20-22, 2006.
    RAID-06-06-Abstract.pdf [application/pdf] (60473 bytes)
    RAID-06-06-Poster.pdf [application/pdf] (1247155 bytes)
  18. Igor Kotenko, Mikhail Stepashkin. Attack Graph based Evaluation of Network Security // Lecture Notes in Computer Science. 2006. . 4237 LNCS. . 216-227. DOI: 10.1007/11909033_20 // https://elibrary.ru/item.asp?id=13510785
    CMS-06-LNCS-4237-Cover.jpg [image/jpeg] (384830 bytes)
    CMS-06-LNCS-4237-Paper.pdf [application/pdf] (429758 bytes)
  19. Igor Kotenko, Alexander Ulanov. Agent Teams in Cyberspace: Security Guards in the Global Internet. : 2006 International Conference on Cyberworlds, CW'06. Lausanne, 2006. . 133-140. DOI: 10.1109/CW.2006.12 // https://elibrary.ru/item.asp?id=18102022
  20. Igor Kotenko, Alexander Ulanov. Research of mechanisms of assault and protection in the Internet. V All-Russian Conference Methods and technical tools of information security (MTTIS 2006). June 26-28, 2006. St. Petersburg, Proceedings. SPbSPU. P.123. (in Russian).
  21. Igor Kotenko, Artem Tishkov. The approach to construction and realization of information security management system based on security policies in computer networks. V All-Russian Conference Methods and technical tools of information security (MTTIS 2006). June 26-28, 2006. St. Petersburg, Proceedings. SPbSPU. P.122. (in Russian).
  22. Mikhail Stepashkin, Igor Kotenko. Technique of the analysis of computer network security based on modelling of the actions of internal and external infringers. V All-Russian Conference Methods and technical tools of information security (MTTIS 2006). June 26-28, 2006. St. Petersburg, Proceedings. SPbSPU. P.121. (in Russian).
  23. Vitaly Bogdanov, Igor Kotenko. Proactive monitoring of correct implementation of computer network security policy. V All-Russian Conference Methods and technical tools of information security (MTTIS 2006). June 26-28, 2006. St. Petersburg, Proceedings. SPbSPU. P.117. (in Russian).
  24. Igor Kotenko, Mikhail Stepashkin, Vitaly Bogdanov. Evaluation of security level of computer networks on the basis of attack graph construction. Sixth International Scientific School "Modelling and Analysis of Safety and Risk in Complex Systems" (MASR - 2006), St. Petersburg, July 4-8, 2006. P.150-154. (in Russian).
  25. Alexander Ulanov, Igor Kotenko. Research of defense mechanisms against the distributed attacks "Denial of service" on the basis of multiagent simulation. Sixth International Scientific School "Modelling and Analysis of Safety and Risk in Complex Systems" (MASR - 2006), St. Petersburg, July 4-8, 2006. P.333-339. (in Russian).
  26. Vladimir Gorodetsky, Igor Kotenko, Rafael Yusupov. Computer networks safety // Bulletin of the Russian Academy of Sciences. 2006. Vol. 76. No. 7. pp. 668-670. ISSN: 0869-5873. // https://www.elibrary.ru/item.asp?id=9312983 (in Russian).
  27. Igor Kotenko, Alexander Ulanov. Multi-agent modeling of distributed "Denial of Service" attacks and defense mechanisms. Proceedings of SPIIRAS, Issue 3, Vol.1. St. Petersburg, Nauka, 2006. P.105-125. // https://elibrary.ru/item.asp?id=15555308 (in Russian).
  28. Igor Kotenko, Mikhail Stepashkin, Rafael Yusupov. Mathematical Models, Methods and Architectures for Computer Networks Security: the State-of-the-art Review of Perspective Directions of Research by Results of International Workshop MMM-ACNS-2005. Proceedings of SPIIRAS, Issue 3, Vol.2. St. Petersburg, Nauka, 2006. P.11-29. (in Russian).
  29. Igor Kotenko, Mikhail Stepashkin, Vitaly Bogdanov. Evaluating Security of Computer Networks based on Attack Graphs and Qualitative Security Metrics. Proceedings of SPIIRAS, Issue 3, Vol.2. St. Petersburg, Nauka, 2006. P.30-49. // https://elibrary.ru/item.asp?id=15555325 (in Russian).
  30. Vitaly Bogdanov, Igor Kotenko. Architecture, models and techniques of functioning of the system of proactive monitoring of security policy. Proceedings of SPIIRAS, Issue 3, Vol.2. St. Petersburg, Nauka, 2006. P.50-69. // https://www.elibrary.ru/item.asp?id=15555326 (in Russian).
  31. Artem Tishkov, Igor Kotenko, Olga Chervatuk, Dmitry Lakomov, Sergey Reznik, Ekaterina Sidelnikova. Conflict Detection and Resolution in Security Policies of Computer Networks. Proceedings of SPIIRAS, Issue 3, Vol.2. St. Petersburg, Nauka, 2006. P.102-114. // https://elibrary.ru/item.asp?id=15555330 (in Russian).
  32. Igor Kotenko, Artem Tishkov, Olga Chervatuk, Dmitry Lakomov. Conflicts search in security policies // Journal of Instrument Engineering, Vol.49, 11, 2006. . 45-49. // https://elibrary.ru/item.asp?id=9336883 (in Russian).
  33. Igor Kotenko, Alexander Ulanov. Agent-oriented environment for simulation and evaluation of "Distributed Denial of Service" defense mechanisms. Journal of Instrument Engineering, Vol.49, 11, 2006 (in Russian).
  34. Igor Kotenko, Alexander Ulanov. Modelling and simulation of counteraction of software agents in the Internet: general approach, simulation environment and experiments. Information Security. Inside, 2006. 4 (10). . 44-52. // https://elibrary.ru/item.asp?id=23409317 (in Russian).
    inside-zi.4-Cover.jpg [image/jpeg] (453792 bytes)
    inside-zi.4-Paper.pdf [application/pdf] (527867 bytes)
  35. Igor Kotenko, Mikhail Stepashkin. Models of actions of hackers-malefactors realizing distributed multistage attacks. X National Conference on Artificial Intelligence with International Participation(CAI-2006) . Proceedings. Vol. 2. Moscow, Fizmatlit, 2006. P.617-625. ISBN: 5-9221-0757-7. // https://elibrary.ru/item.asp?id=35556016 (in Russian).
    inside-zi.5-Cover.jpg [image/jpeg] (410110 bytes)
    inside-zi.5-Paper.pdf [application/pdf] (1110624 bytes)
  36. Igor Kotenko, Alexander Ulanov. Agent - based modeling of complex systems behavior in the internet environment// X National Conference on Artificial Intelligence with International Participation(CAI-2006). Proceedings. Vol. 2. Moscow, Fizmatlit, 2006. P.660-668. ISBN: 5-9221-0757-7. // https://elibrary.ru/item.asp?id=35463337 (in Russian).
    NCAI-06-A-Kotenko1.pdf [application/pdf] (7392 bytes)
    NCAI-06-Kotenko1.pdf [application/pdf] (412623 bytes)
  37. Mikhail Stepashkin, Igor Kotenko, Vitaly Bogdanov. Intelligent system of computer network security analysis. X National Conference on Artificial Intelligence with International Participation(CAI-2006) . Proceedings. Vol. 2. Moscow, Fizmatlit, 2006. P.149-157. ISBN: 5-9221-0757-7. // https://elibrary.ru/item.asp?id=35464871 (in Russian).
    NCAI-06-A-Stepashkin.pdf [application/pdf] (7539 bytes)
    NCAI-06-Cover.jpg [image/jpeg] (261448 bytes)
    NCAI-06-Stepashkin.pdf [application/pdf] (347385 bytes)
  38. Alexander Ulanov, Igor Kotenko. Multi-agent system for simulation of computer network defense mechanisms. X National Conference on Artificial Intelligence with International Participation(CAI-2006) . Proceedings. Vol. 2. Moscow, Fizmatlit, 2006. P.867-876. ISBN: 5-9221-0757-7.// https://elibrary.ru/item.asp?id=35556154 (in Russian).
  39. Igor Kotenko, Mikhail Stepashkin, Vitaly Bogdanov. Models and methods of intellectual assessment of the level of security of computer networks. International Conferences "Intelligent systems (AIS'06)" and "Intelligent CAD (CAD-2006)". Proceedings.Moscow, Fizmatlit, 2006. P.321-328. ISBN: 5-9221-0686-4.// https://elibrary.ru/item.asp?id=36305711 (in Russian).
    AIS-06-A-Kotenko1.pdf [application/pdf] (7871 bytes)
    AIS-06-Cover.jpg [image/jpeg] (200919 bytes)
    AIS-06-Kotenko-paper.pdf [application/pdf] (238483 bytes)
  40. Vitaly Bogdanov, Igor Kotenko. Analysis of security policy compliance in computer networks: proactive approach. International Conferences "Intelligent systems (AIS'06)" and "Intelligent CAD (CAD-2006)". Proceedings.Moscow, Fizmatlit, 2006. P.313-320 ISBN: 5-9221-0686-4. (in Russian).
    AIS-06-A-Bogdanov.pdf [application/pdf] (7934 bytes)
    AIS-06-Bogdanov-paper.pdf [application/pdf] (246197 bytes)
  41. Igor Kotenko, Alexander Ulanov. Cooperative work of the teams of agents in the protection against network attacks of violation of availability. International Conferences "Intelligent systems (AIS'06)" and "Intelligent CAD (CAD-2006)". Proceedings.Moscow, Fizmatlit, 2006. P.306-313. ISBN: 5-9221-0686-4. // https://elibrary.ru/item.asp?id=36555011 (in Russian).
    AIS-06-A-Kotenko2.pdf [application/pdf] (7637 bytes)
    AIS-06-Kotenko-paper.pdf [application/pdf] (599294 bytes)
  42. Igor Kotenko, Alexander Ulanov. Teams of agents in cyberspace: modelling and simulation of information protection processes in the global Internet // Proceedings of the Institute of System Analysis of the Russian Academy of Sciences. 2006. Vol. 27. pp. 108-129. // https://elibrary.ru/item.asp?id=11970008 (in Russian).
  43. Igor Kotenko, Alexander Ulanov. Conflicts in the Internet: models of counteraction to distributed cyber attacks // In the collection: Materials of the Second International Scientific Conference on security and counter-terrorism. 2006. pp. 485-494. // https://elibrary.ru/item.asp?id=44516292 (in Russian).
  44. Vitaly Bogdanov, Igor Kotenko, Mikhail Stepashkin. A proactive approach to security policy monitoring in computer networks. The Firth All-Russian scientific Conference "Mathematics and Security of Information Technologies" (MSIT-06). Moscow, Lomonosov Moscow State University, 2006. (in Russian).
  45. Igor Kotenko, Rafael Yusupov. The main directions of scientific research in the field of protection of computer networks and systems. St.Petersburg International Conference "Regional Informatics-2006" (RI-2006). Proceedings. St. Petersburg, October 24-26, 2006. (in Russian).
  46. Victor Vorontsov, Igor Kotenko. Research of approaches to automatic detection and prevention of virus attacks on the basis of the combined mechanisms of network traffic restriction. St.Petersburg International Conference "Regional Informatics-2006" (RI-2006). Proceedings. St. Petersburg, October 24-26, 2006. P.105-106. (in Russian).
  47. Vasily Desnitsky, Igor Kotenko. Protection of the software against breaking: the analysis of methods. St.Petersburg International Conference "Regional Informatics-2006" (RI-2006). Proceedings. St. Petersburg, October 24-26, 2006. P.108-109. (in Russian).
  48. Igor Kotenko, Alexander Ulanov. Opposition in the Internet: Modeling and Simulation of Counteraction to Distributed Cyber-attacks // Materials of the Second International Scientific Conference on Security and Counter-terrorism. 2006. pp. 485-494 // https://www.elibrary.ru/item.asp?id=44516292 (in Russian).
  49. I.V. Kotenko, M.V. Stepashkin, R.M. Yusupov. Mathematical models, methods and architectures for computer networks security: the state-of-the-art review of perspective directions of research by results of international workshop mmm-acns-2005 // Proceedings of SPIIRAN. 2006. Vol. 2. No. 3. pp. 11-29.// https://elibrary.ru/item.asp?id=15555324 (in Russian).

2005

  1. Vladimir Gorodetsky, Igor Kotenko. Conceptual Foundations of Stochastic Modeling in the Internet Environment // Transactions of System Analysis Institute, vol.9, Foundations of Information Technologies and Systems. URSS, Moscow, 2005, P.168-185 // https://www.elibrary.ru/item.asp?id=36274917 (in Russian).
  2. Igor Kotenko. Multiagent models of counteracting malefactors and security systems in the Internet. Mathematics and security of information technologies. Conference proceedings. Moscow, Moscow State University, 2005. P.257-265.// https://www.elibrary.ru/item.asp?id=35587479 (in Russian).
  3. Artem Tishkov, Igor Kotenko. Specification and verifications of security policies of protected computer network: using Event calculus. Mathematics and security of information technologies. Conference proceedings. Moscow, Moscow State University, 2005. P.279-283. // https://www.elibrary.ru/item.asp?id=35588934 (in Russian).
  4. Igor Kotenko. Models of counteracting the agents teams of "Distributed Denial of Service" attacks and protection against them. Intelligent systems. Collective monograph .V.M.Kureichik (ed.). Moscow, Fizmatlit, 2005. P.181-188. (in Russian).
  5. Igor Kotenko, Sergey Nesterov. About the approach to development of functionality of network security scanners. XII All-Russian scientific conference "Problems of information security in the Higher School". MIPI, 2005. P.115-116. (in Russian).
  6. Igor Kotenko, Dmitriy Mihailov. Multiagent technologies in tasks of automated monitoring the information systems of industry enterprises. Science and technologies in industry. 1, 2005. (in Russian).
  7. Igor Kotenko. Agent-Based Modeling and Simulation of Cyber-Warfare between Malefactors and Security Agents in Internet // : Simulation in Wider Europe - 19th European Conference on Modelling and Simulation, ECMS 2005. 2005. . 533-543. // https://www.elibrary.ru/item.asp?id=18239081
    ECMS2005-Cover.jpg [image/jpeg] (399631 bytes)
    ECMS2005-Paper.pdf [application/pdf] (1013528 bytes)
  8. Igor Kotenko, Alexander Ulanov. Multiagent modeling and simulation of agents' competition for network resources availability. The Fourth International Conference on Autonomous Agents and Multi-Agent Systems. Second International Workshop on Safety and Security in Multiagent Systems (SASEMAS '05). Utrecht, The Netherlands. 2005. P.27-43.
    SASEMAS05-Cover.jpg [image/jpeg] (372878 bytes)
    SASEMAS05-Paper.pdf [application/pdf] (452962 bytes)
  9. Igor Kotenko, Mikhail Stepashkin. Usage of dummy information systems for protecting resources of computer networks // Problems of information security. Computer systems. 2005, 1, P.63-73. // https://elibrary.ru/item.asp?id=11622219 (in Russian).
  10. Rafael Yusupov, Igor Kotenko. Security of computer networks and systems: a state of the art and perspective directions of scientific research. IV St.Petersburg Interregional Conference Information Security of Russian Regions ("ISRR-2005"). June 14-16, 2005. Proceedings. St.Petersburg, 2005. P.90-91. (in Russian).
  11. Artem Tishkov, Igor Kotenko. Multimodular architecture of security policy verifier. IV St.Petersburg Interregional Conference Information Security of Russian Regions ("ISRR-2005"). June 14-16, 2005. Proceedings. St.Petersburg, 2005.P.79-80. (in Russian).
  12. Igor Kotenko, Mikhail Stepashkin. Imitation models for security level evaluation of information systems at their design stage.IV St.Petersburg Interregional Conference Information Security of Russian Regions ("ISRR-2005"). June 14-16, 2005. Proceedings. St.Petersburg, 2005. P.63-64. (in Russian).
  13. Mikhail Stepashkin, Igor Kotenko. The testbed of checking decisions on information protection in computer networks. IV St.Petersburg Interregional Conference Information Security of Russian Regions ("ISRR-2005"). June 14-16, 2005. Proceedings. St.Petersburg, 2005. P.77-78. (in Russian).
  14. Alexander Ulanov, Igor Kotenko. Modelling of protecting against DDOS attacks on the basis of intelligent agents' teamwork. IV St.Petersburg Interregional Conference Information Security of Russian Regions ("ISRR-2005"). June 14-16, 2005. Proceedings. St.Petersburg, 2005. P.81-82. (in Russian).
  15. Igor Kotenko, Alexander Ulanov. Agent-oriented modelling and simulation of information protection processes: an antagonism of agents for availability of computer networks resources. International Conferences "Artificial Intelligence Systems" (IEEE AIS'05)" and "Intelligent CAD" (CAD-2005). Divnomorskoe, September 3-10, 2005, Proceedings.oscow, Fizmatlit, 2005. Vol.1. P.296-301. // https://elibrary.ru/item.asp?id=50362681 (in Russian).
  16. Igor Kotenko, Mikhail Stepashkin. Intelligent system for analyzing computer networks security at various stages of life cycle. International Conferences "Artificial Intelligence Systems" (IEEE AIS'05)" and "Intelligent CAD" (CAD-2005).Proceedings. oscow, Fizmatlit, 2005. Vol.1. P.231-237. // https://elibrary.ru/item.asp?id=50362729 (in Russian).
  17. Igor Kotenko, Alexander Ulanov. Teamwork Approach for Modeling and Simulation of DDOS attacks in Internet. 6th Workshop on Agent-Based Simulation. ABS6. Erlangen. Germany. September 12-15, 2005. P.28-33.
  18. Igor Kotenko, Mikhail Stepashkin. Analyzing Vulnerabilities and Measuring Security Level at Design and Exploitation Stages of Computer Network Life Cycle. The Third International Workshop "Mathematical Methods, Models and Architectures for Computer Networks Security" (MMM-ACNS-05). September 24-28, 2005, St. Petersburg, Russia.
  19. Artem Tishkov, Igor Kotenko, Ekaterina Sidelnikova. Security Checker Architecture for Policy-based Security Management. Lecture Notes in Computer Science. 2005. . 3685 LNCS. . 460-465. DOI: 10.1007/11560326_40 // https://elibrary.ru/item.asp?id=13477534
  20. Vitaliy Bogdanov, Igor Kotenko, Mikhail Stepashkin. The active security analysis of computer networks. IV All-Russian scientific and technical conference "Methods and tools of information assurance". October 4-6, 2005. St. Petersburg, Proceedings .SPbSPU. 2005. P.95. (in Russian).
  21. Igor Kotenko, Alexander Ulanov The software environment for simulation of protection mechanisms against distributed attacks "Denial of Service".IV All-Russian scientific and technical conference "Methods and tools of information assurance". October 4-6, 2005. St. Petersburg, Proceedings .SPbSPU. 2005. P.96. (in Russian).
  22. Mikhail Stepashkin, Vitaliy Bogdanov, Igor Kotenko. Subsystem of the passive analysis of computer networks security. IV All-Russian scientific and technical conference "Methods and tools of information assurance". October 4-6, 2005. St. Petersburg, Proceedings .SPbSPU. 2005. P.100. (in Russian).
  23. Artem Tishkov, Igor Kotenko. Verification of security policies in computer systems. IV All-Russian scientific and technical conference "Methods and tools of information assurance". October 4-6, 2005. St. Petersburg, Proceedings .SPbSPU. 2005. P.101. (in Russian).
  24. Mikhail Stepashkin, Igor Kotenko, Vitaliy Bogdanov. Imitation of attacks for the active vulnerabilities analysis of computer networks. The second All-Russian scientific-practical conference on imitation modelling and its application in science and industry "Imitation modelling. Theory and practice". IMMOD-2005. Proceedings. Vol.1. St.Petersburg, October 19-21, 2005. P.269-273. (in Russian).
  25. Igor Kotenko, Alexander Ulanov. Multiagent environment for simulating the mechanisms of protection against distributed computer attacks. The second All-Russian scientific-practical conference on imitation modelling and its application in science and industry "Imitation modelling. Theory and practice". IMMOD-2005. Proceedings. Vol.1. St.Petersburg, October 19-21, 2005. P.220-224. (in Russian).
  26. Olga Chervatuk, Artem Tishkov, Igor Kotenko. Verification by model checking in the task of dynamic detection of conflicts in security policy. The second All-Russian scientific-practical conference on imitation modelling and its application in science and industry "Imitation modelling. Theory and practice". IMMOD-2005. Proceedings. Vol.1. St.Petersburg, October 19-21, 2005. P.283-287. (in Russian).
  27. Igor Kotenko, Alexander Ulanov. Agent-based simulation of DDOS attacks and defense mechanisms // International Journal of Computing. 2005. . 4. 2. . 16-37. // https://elibrary.ru/item.asp?id=35579859
    Computing-05-Vol.4-Issue-2-Cover.jpg [image/jpeg] (510237 bytes)
    Computing-05-Vol.4-Issue-2-Paper.pdf [application/pdf] (583575 bytes)
  28. Igor Kotenko, Alexander Ulanov. Software testbed and experiments for exploring counteraction of attack and defense agents in the Internet. In the collection: Materials of the Second International Scientific Conference on Security and Counter-Terrorism. 2006. pp. 53-61.// https://elibrary.ru/item.asp?id=44523650 (in Russian).
  29. Vladimir Gorodetski, Igor Kotenko, Viktor Skormin (Editors). Computer Network Security. Lecture Notes in Computer Science, Vol.3685, Springer Verlag, 2005.
  30. Igor Kotenko, Alexander Ulanov. The Software Environment for multi-agent Simulation of Defense Mechanisms against DDoS Attacks. : Proceedings - International Conference on Computational Intelligence for Modelling, Control and Automation. 2005. P. 283-288. // https://elibrary.ru/item.asp?id=15339667
  31. Igor Kotenko, Artem Tishkov, Dmitriy Lakomov, Olga Chervatuk, Ekaterina Sidelnikova. Checking correctness of security policies. IV Inter-regional Conference "Information Security of Russia Regions". Selected papers proceedings. St.Petersburg, 2005. (in Russian).
  32. Igor Kotenko, Mikhail Stepashkin, Vitaliy Bogdanov. Model of attacks for imitating malefactor's actions in security analysis system for computer networks. IV Inter-regional Conference "Information Security of Russia Regions". Selected papers proceedings. St.Petersburg, 2005. (in Russian).
  33. Igor Kotenko, Rafael Yusupov. Computer security: the perspective directions of SPIIRAS research. IV Inter-regional Conference "Information Security of Russia Regions". Selected papers proceedings. St.Petersburg, 2005. (in Russian).
  34. Igor Kotenko. Multi-agent modeling and simulation of computer network security processes: "a game of network cats and mice". NATO Advanced Study Institute (ASI). "Network Security and Intrusion Detection". October 1-12, 2005. Nork, Yerevan, Armenia, IOS Press. 2005.
  35. Igor Kotenko, Mikhail Stepashkin. Analyzing Vulnerabilities and Measuring Security Level at Design and Exploitation Stages of Computer Network Life Cycle // Lecture Notes in Computer Science. 2005. . 3685 LNCS. . 311-324. DOI: 10.1007/11560326_24 // https://elibrary.ru/item.asp?id=13479053

2004

  1. Igor Kotenko. Multi-agent applications developed for vulnerabilities analysis and intrusion detection in computer networks // 2004. No. 1. pp. 56-72. // https://www.elibrary.ru/item.asp?id=50238782 (in Russian).
    Confident-2-2004-Cover.jpg [image/jpeg] (203883 bytes)
    Confident-2-2004-Paper.pdf [application/pdf] (536500 bytes)
    Confident-3-2004-Cover.jpg [image/jpeg] (196652 bytes)
    Confident-3-2004-Paper.pdf [application/pdf] (488448 bytes)
  2. Igor Kotenko. Theoretical aspects of developing deception systems. III Inter-regional Conference "Information Security of Russia Regions". Proceedings. St.Petersburg. 2004. P.59-68. (in Russian).
  3. Igor Kotenko, Mikhail Stepashkin. The prototype of deception system simulator: architecture and scripts of carrying out of experiments. III Inter-regional Conference "Information Security of Russia Regions". Proceedings. St.Petersburg. 2004. P.68-73. (in Russian).
  4. Alexander Ulanov, Igor Kotenko. Modeling attack "Distributed Denial of Service" by an example of using virus Mydoom. IX International Conference "Regional informatics-2004", St. Petersburg, Proceedings. SPb., 2004. P.155-156. (in Russian).
  5. Mikhail Stepashkin, Igor Kotenko. Analysis of attributes of network connections and operational system logs for intrusion detection. IX International Conference "Regional informatics-2004", St. Petersburg, Proceedings. SPb., 2004. P.152-153. (in Russian).
  6. Igor Kotenko, Mikhail Stepashkin. Monitoring of users work in computer networks. IX International Conference "Regional informatics-2004", St. Petersburg, Proceedings. SPb., 2004. P.136-137. (in Russian).
  7. Igor Kotenko, Mikhail Stepashkin. Deception systems for protection of information resources in computer networks. Proceedings of SPIIRAS, 2004. Vol. 1. 2. P. 211-230. (in Russian) // https://elibrary.ru/item.asp?id=15286952 (in Russian).
  8. Vladimir Gorodetski, Oleg Karsayev, Igor Kotenko, V.Samoilov. Multi-Agent Information Fusion: Methodology, Architecture and Software Tool for Learning of Object and Situation Assessment // : Proceedings of the Seventh International Conference on Information Fusion, FUSION 2004. sponsors: Sweden Defence Research Agency, SAAB AB, Ericsson Microwave Systems AB, Lockheed Martin Corp., Sjoland and Thyselius AB; editors: Svensson P., Schubert J., Swedish Defence Research Agency FOI. Stockholm, 2004. . 346-353. // https://www.elibrary.ru/item.asp?id=16946066
    fusion-04-paper.pdf [application/pdf] (451039 bytes)
  9. Pavel Laskov, Christin Schafer, Igor Kotenko. Intrusion detection in unlabeled data with one-class Support Vector Machines. Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2004), Lecture Notes in Informatics (LNI), No. 46, Dortmund, Germany, July 2004. P.71-82.
    DIMVA-04-Cover.jpg [image/jpeg] (781850 bytes)
    DIMVA-04-paper.pdf [application/pdf] (215790 bytes)
  10. Igor Kotenko, Mikhail Stepashkin. Intelligent deception systems for information security in computer networks. International Conferences "Artificial Intelligence Systems" (IEEE AIS'04)" and "Intelligent CAD" (CAD-2004). Proceedings. Divnomorskoe, September 3-10, 2004. P.204-209. (in Russian).
  11. Igor Kotenko. Recognition of agents-hackers plans at detecting computer attacks. International Conferences "Artificial Intelligence Systems" (IEEE AIS'04)" and "Intelligent CAD" (CAD-2004). Proceedings .Divnomorskoe, September 3-10, 2004. P.198-204. (in Russian).
  12. Igor Kotenko, ArtemTishkov, M.Tishkova. The event calculus implementation using ILOG JRules for security policy verification. 9-th International Workshop SPEECH AND COMPUTER (SPECOM'2004) 20-22 September 2004, St. Petersburg, Russia. 2004. P.630-633.
  13. Igor Kotenko. Multi-agent applications developed for vulnerabilities analysis and intrusion detection in computer networks // AI News, 1, 2004. P.56-72.// https://www.elibrary.ru/item.asp?id=50238782 (in Russian).
  14. Igor Kotenko. Modeling and Simulation of Attacks for Verification of Security Policy and Vulnerability Assessment. Seventh International Symposium on Recent Advances in Intrusion Detection. RAID 2004. Abstract and Poster sessions. Sophia-Antipolis, French Riviera, France, September 15-17, 2004.
  15. Igor Kotenko. Mutiagent modeling of attack "Distributed Denial of Service". IX National Conference on Artificial Intelligence with international participation. Proceedings. Vol.2. oscow: Fizmatlit, 2004. P.723-731. (in Russian).
  16. Vladimir Gorodetsky, Igor Kotenko. Scenarios Knowledge base: A Formal Framework for Proactive Coordination of Coalition Operations. Knowledge Systems for Coalition Operation. M.Pechoucek, A.Tate (eds.). Third International Conference on Knowledge Systems for Coalition Operations (KSCO-2004). Pensacola, Florida. 2004. P.83-97.
    KSCO-04-Cover.jpg [image/jpeg] (142459 bytes)
    KSCO-04-Paper.pdf [application/pdf] (278320 bytes)
  17. Artem Tishkov, Igor Kotenko System of security policies verification in protected computer networks.II Russian Conference "Methods and tools of information assurance". St. Petersburg, Proceedings.SPbSPU. October 4-5, 2004. P.129. (in Russian).
  18. Igor Kotenko, Mikhail Stepashkin, Dmitriy Mihailov. System of collection, analysis and storage of data for users work audit. II Russian Conference "Methods and tools of information assurance". St. Petersburg, Proceedings.SPbSPU. October 4-5, 2004.P.124. (in Russian).
  19. Igor Kotenko, Mikhail Stepashkin. Recognition of goals and plans of malefactors at detecting computer attacks. II Russian Conference "Methods and tools of information assurance". St. Petersburg, SPbSPU. October 4-5, Proceedings. 2004. P.97. (in Russian).
  20. Alexander Ulanov, Igor Kotenko. Models of DDoS-attacks and mechanisms of protection against them. II Russian Conference "Methods and tools of information assurance". St. Petersburg, Proceedings.SPbSPU. October 4-5, 2004. P.106. (in Russian).
  21. Pavel Laskov, Christin Schafer, Igor Kotenko, Klaus-Robert Muller. Intrusion detection in unlabeled data with quarter-sphere Support Vector Machines. : Lecture Notes in Informatics (LNI), Proceedings - Series of the Gesellschaft fur Informatik (GI). 2004. . 71-82. // https://elibrary.ru/item.asp?id=41606738
  22. Igor Kotenko. Modeling cyber war: models of teams of attack and protection agents acting in Internet. Applied intelligent systems. oscow, Fizmatlit, 2004 (in Russian).
  23. I.V. Kotenko. Multi-agent applications developed for vulnerabilities analysis and intrusion detection in computer networks // Information protection. Confidential. 2004. No. 2. pp. 72-76. // https://www.elibrary.ru/item.asp?id=28381656 (in Russian).

2003

  1. Vladimir Gorodetsky, Igor Kotenko, Oleg Karsaev. Multi-agent Technologies for Computer Network Security: Attack Simulation, Intrusion Detection and Intrusion Detection Learning // Computer Systems Science and Engineering. 2003. . 18. 4. . 191-200. // https://www.elibrary.ru/item.asp?id=13440695
    ICSSE-2003-paper.pdf [application/pdf] (1871467 bytes)
  2. Igor Kotenko. Multi-agent technologies of active vulnerabilities analysis and intrusion detection for creating secure distributed computer systems. Proceedings of International Congress "Trust and safety in informational society", St. Petersburg, April 21-22, 2003. (in Russian).
  3. Igor Kotenko, Evgeniy Man'kov. Agent-Based Modeling and Simulation of Computer Network Attacks. Proceedings of Fourth International Workshop "Agent-Based Simulation 4 (ABS 4)". Jean-Pierre Muller, Martina-M.Seidel (Editors). April 28-3. Montpellier, France, 2003, P.121-126.
  4. Igor Kotenko. Teamwork of Hackers-Agents: Modeling and Simulation of Coordinated Distributed Attacks on Computer Networks // Lecture Notes in Computer Science. 2003. . 2691. . 464. DOI: 10.1007/3-540-45023-8_45 // https://www.elibrary.ru/item.asp?id=18246409
  5. Vladimir Gorodetsky, Igor Kotenko, J.B.Michael. Multi-agent Modeling and Simulation of Distributed Denial of Service Attacks on Computer Networks. Proceedings of Third International Conference "NAVY AND SHIPBUILDING NOWADAYS" (NSN'2003). St. Petersburg, Russia, June 26-28, 2003. P.38-47.
  6. A.Alexeev, Igor Kotenko. Teamwork of agents protecting from distributed attacks "Denial of service". Proceedings of International Conference on Soft Computing and Measurements (SMC'2003). St-Petersburg, Russia. June 25 - 27, 2003, P.294-297. (in Russian).
  7. Igor Kotenko, Mikhail Stepashkin. Intelligent system for simulating attacks on Web-server for computer systems vulnerabilities analysis. Proceedings of International Conference on Soft Computing and Measurements (SMC'2003). St. Petersburg, Russia, June 25 - 27, 2003, P.298-301. (in Russian).
  8. Igor Kotenko, Leonid Stankevich. Real-time Teamwork of Agents. AI News, 3, 2003. P.25-31.// https://www.elibrary.ru/item.asp?id=50209381 (in Russian).
  9. Igor Kotenko. Models of Opposition of Agents Teams in realizing of and protecting from distributed attacks "Denial of service".International Conferences "Artificial Intelligence Systems" (IEEE AIS'03)" and "Intelligent CAD" (CAD-2003).Proceedings. Divnomorskoe, September 3-10, 2003. Vol.1. P.422-428. (in Russian).
  10. Sergey Nesterov, Igor Kotenko. Risk analysis of computer systems on the basis of using network attack simulator. VIII International Conference "Regional informatics-2002".Proceedings, St. Petersburg, 2003. P.185-189. (in Russian).
  11. I.Kotenko, A.Alexeev. Modeling of DDoS-attacks on the basis of agents' teamwork. Proceedings of the VIII International Conference "Regional informatics-2002". St. Petersburg, 2003. P.180-184. (in Russian).
  12. Igor Kotenko, Sergey Nesterov. Information assurance systems design by integrating the procedures of risk analysis and active security audit. International Conference "Modeling and Analysis of Safety and Risk in Complex Systems" (MA SR - 2003). St. Petersburg, August 20-23, 2003. P.396-402. (in Russian).
  13. Igor Kotenko, Evgeny Man'kov. Experiments with simulation of attacks against computer networks // Lecture Notes in Computer Science. 2003. . 2776. . 183-194. DOI: 10.1007/978-3-540-45215-7_15 // https://www.elibrary.ru/item.asp?id=13437915
  14. Igor Kotenko, Alexey Alexeev, Evgeny Man'kov. Formal framework for modeling and simulation of ddos attacks based on teamwork of hackers-agents // Proceedings of 2003 IEEE/WIC International Conference on Intelligent Agent Technology, Halifax, Canada, October 13-16, 2003, IEEE Computer Society. 2003, P.507-510. // https://www.elibrary.ru/item.asp?id=16942583
  15. Igor Kotenko. Active vulnerability assessment of computer networks by simulation of complex remote attacks. : Proceedings - 2003 International Conference on Computer Networks and Mobile Computing, ICCNMC 2003. 2003. . 40-47.
  16. Vladimir Gorodetsky, Oleg Karsaev, Igor Kotenko, V.Samoilov, Mikhail Stepashkin. Multi-agent system of intrusion detection learning. III Inter-regional Conference "Information Security of Russia Regions", Proceedings. Vol.1. St. Petersburg, November 25-27, 2003.P.118. (in Russian).
  17. Dmitriy Komashinski, Igor Kotenko. Multi-agent technology for modeling of virus expansion within Internet. III Inter-regional Conference "Information Security of Russia Regions". Proceedings.Vol.1. St. Petersburg, November 25-27, 2003. P.127-128 (in Russian).
  18. Igor Kotenko. Modeling of cyber war on the basis of agents' technologies.III Inter-regional Conference "Information Security of Russia Regions",Proceedings. Vol.1. St. Petersburg, November 25-27, 2003.P.70-71 (in Russian).
  19. Alexey Alexeev, Igor Kotenko. Multi-agent system of DDOS-attacks simulation. I Russian Conference "Methods and tools of information assurance".Proceedings. St. Petersburg, SPbSPU, November 26-27, 2003.P.101-102. (in Russian).
  20. Igor Kotenko, Mikhail Stepashkin. Prototype of honeypot system. I Russian Conference "Methods and tools of information assurance".Proceedings. St. Petersburg, SPbSPU,. November 26-27, 2003.P.57-58. (in Russian).
  21. Igor Kotenko, Evgeny Man'kov. Stochastic model of attacks on computer networks based on state machines. Informatization and communication, 1-2, 2003. P.61-67. (in Russian).
  22. Igor Kotenko, Vladimir Gorodetski. Multi-agent Systems for Intrusion Detection. Proceedings of China-Russia Bilateral Conference on Intelligent Information Processing (CRBCIIP-2003), October 19-23, 2003, Shanghai, China. P.9-17.
  23. Igor Kotenko. Multi-agent Modeling and Simulation of Computer Network Attacks based on Teamwork Models and Formal Grammars. Proceedings of China-Russia Bilateral Conference on Intelligent Information Processing (CRBCIIP-2003), October 19-23, 2003, Shanghai, China. P.18-29.
  24. Igor Kotenko. The taxonomies of the attacks on computer systems // SPIIRAS Proceeding, Vol.2. 1. SPb, SPIIRAS, 2003. P.196-211.// https://elibrary.ru/item.asp?id=15512676 (in Russian).
  25. V. Gorodetsky, Igor Kotenko, J. Michael. Multi-agent modeling and simulation of distributed denial-of-service attacks on computer networks // Published 2003, Computer Science, Engineering // Corpus ID: 14198534

2002

  1. Vladimir Gorodetsky, Igor Kotenko, Oleg Karsaev, Aleksey Khabalov. Software Development Kit for Multi-agent Systems Design and Implementation. Lecture Notes in Artificial Intelligence, Vol.2296, Springer Verlag, 2002. P.121-130.
  2. Vladimir Gorodetski, Igor Kotenko. Formal Model of complex distributed attacks on Computer Networks. II Inter-regional Conference "Information Security of Russia Regions". Proceedings. Vol.2. Saint-Petersburg, 2002. P.92-97. (in Russian).
  3. Vladimir Gorodetski, Igor Kotenko. Teamwork of Agents in Antagonistic Environment. International Conference on Soft Computing and Measurements. SMC'2002. Proceedings. Saint-Petersburg, 2002. Vol.1. P.259-262. (in Russian).
  4. Igor Kotenko, Oleg Karsayev, V.V.Samoilov. Ontology of learning for Intrusion Detection in Computer Networks. International Conference on Soft Computing and Measurements. SMC'2002. Proceedings. Saint-Petersburg, 2002. Vol.1. P.255-258. (in Russian).
  5. Vladimir Gorodetski, Igor Kotenko. The Multi-agent Systems for Computer Network Security Assurance: frameworks and case studies // : 2002 IEEE International Conference on Artificial Intelligence Systems, ICAIS 2002. Proceedings. 2002. . 297-302. DOI: 10.1109/ICAIS.2002.1048117 // https://www.elibrary.ru/item.asp?id=26997768
    ICAIS-02-paper.pdf [application/pdf] (177148 bytes)
  6. Igor Kotenko, Leonid Stankevich. The Control of Teams of Autonomous Objects in the Time-Constrained Environments // : 2002 IEEE International Conference on Artificial Intelligence Systems, ICAIS 2002. Proceedings. 2002. . 158-163. DOI: 10.1109/ICAIS.2002.1048074 // https://www.elibrary.ru/item.asp?id=26996200
  7. Igor Kotenko, Evgeniy Man'kov. Simulation of Attacks on Telecommunication Systems. VIII International Conference on Informational Networks, Systems and Technologies. ICINSAT-2002. SUT. St.Petersburg, 2002. P.190-198. (in Russian).
  8. Igor Kotenko. Multi-agent Technologies for Support of Intrusion Detection in Computer Networks. Russian Conference "Methods and tools of information assurance". Proceedings. Saint-Petersburg - Pushkin,2002.P.44-45. (in Russian).
  9. Vladimir Gorodetski, Igor Kotenko. Teamwork of Hackers-Agents: Application of Multiagent Technology for Simulation of Distributed Attacks on Computer Networks. VIII National conference with international involvement on Artificial Intelligence Proceedings. Moscow, 2002. P.711-720. (in Russian).
  10. Igor Kotenko, Nikolay Lihvanzev. The Technology of Expert Critics for Intelligent Support of Decision Making. VIII National conference with international involvement on Artificial Intelligence(CAI-2002). Proceedings. Moscow, 2002. P.565-574. (in Russian).
  11. Igor Kotenko, Leonid Stankevich. Agents' Teamwork in Conditions of Time Constraints. Third International Conference "Artificial Intelligence -2002". Proceedings . 2002. Crimea, Ukraine, 2002.P.249-253 (in Russian).
  12. Igor Kotenko.Case-based Recovering of Formal Grammars specifying Scenarios of Computer Attacks. Third International Conference "Artificial Intelligence -2002". Proceedings. 2002. Crimea, Ukraine, 2002. (in Russian).
  13. Vladimir Gorodetski, Igor Kotenko. Attacks against Computer Network: Formal Grammar-based Framework and Simulation Tool // Lecture Notes in Computer Science. 2002. . 2516. . 219-238. DOI: 10.1007/3-540-36084-0_12 // https://www.elibrary.ru/item.asp?id=26879314
    RAID-02-paper.pdf [application/pdf] (137246 bytes)

2001

  1. Igor Kotenko, Oleg Karsayev. Application of Multi-agent Technology for Integrated Assurance of Computer Networks. Transactions of Taganrog Radio-Technical University, 4(22), 2001. P.38-50. // https://www.elibrary.ru/item.asp?id=12854339 (in Russian).
  2. Igor Kotenko, Nikolay Lihvanzev. Multi-agent Technology of Expert Critics for Intelligent Decision Support. Transactions of Taganrog Radio-Technical University, 4(22), 2001. P.17-25. // https://www.elibrary.ru/item.asp?id=12854337 (in Russian).
  3. Vladimir Gorodetski, Igor Kotenko. Models of Attacks on Computer Networks based on Formal Grammars. International Conference on Soft Computing and Measurements. SMC'2001. Proceedings. Saint-Petersburg, 2001. Vol.1. P.212-216. (in Russian).
  4. Nikolay Lihvanzev, Igor Kotenko. Model of Self-adaptation of Expert Critics Components based on Probabilistic State Machines. International Conference on Soft Computing and Measurements. SMC'2001. Proceedings. Saint-Petersburg, 2001. Vol.1. P.131-136. (in Russian).
  5. Vladimir Gorodetski, Oleg Karsayev, Igor Kotenko. Program prototype of the Multi-Agent Computer Network Intrusion Detection System. CAI'2001. International Congress "Artificial Intelligence in XXI Century". Proceedings. Vol.1. 2001. P.280-293. (in Russian).
  6. Vladimir Gorodetski, Oleg Karsayev, Igor Kotenko, Aleksey Khabalov. MAS DK: Software Development Kit for Multi-agent Systems Implementation and Examples of Applications. ICAI'2001. International Congress "Artificial Intelligence in XXI Century". Proceedings. Vol.1. 2001. P.249-262. (in Russian).
  7. Vladimir Gorodetsky, Oleg Karsayev, Aleksey Khabalov, Igor Kotenko, Jeffrey Popyack, Viktor Skormin. Agent-based Model of Computer Network Security System: A Case Study. Information Assurance in Computer Networks. Methods, Models, and Architectures for Network Security. International Workshop MMM-ACNS 2001. St.Petersburg, Russia, May 2001.
  8. Vladimir Gorodetsky, Oleg Karsayev, Igor Kotenko, Aleksey Khabalov. Software Development Kit for Multi-agent Systems Design and Implementation. Proceedings of the Second International Workshop of Central and Eastern Europe on Multi-agent Systems. CEEMAS'01. Krakow, Poland, September 26-29, 2001. B.Dunin-Keplicz, E.Nawarecki (Eds.). 2001. P.99-108.
  9. V.Gorodetski, O.Karsayev, I.Kotenko . Multi-agent System of Intrusion Detection into Computer Networks. II Inter-regional Conference "Information Security of Russia Regions " . Proceedings. Vol.1. Saint-Petersburg, 2001. P.56. (in Russian).
  10. V.Gorodetski, I.Kotenko, E,Man'kov. Modeling of distributed Attacks on Computer Networks. II Inter-regional Conference "Information Security of Russia Regions " . Proceedings. Vol.1. Saint-Petersburg, 2001. P.56-57. (in Russian).
  11. I.V. Kotenko. Multi-agent model of decision support in the cooperative work of designers // Perspective information technologies and intelligent systems. 2001. No. 1. p. 10. (in Russian).
  12. Vladimir Gorodetsky, Oleg Karsayev, Aleksey Khabalov, Igor Kotenko, Jeffrey Popyack, Viktor Skormin. Agent-based Model of Computer Network Security System: A Case Study. Lecture Notes in Computer Science. 2001. . 2052. . 39-50. DOI: 10.1007/3-540-45116-1_7 eLIBRARY ID: 26853674 (in Russian).

2000

  1. Vladimir Gorodetsky, Igor Kotenko, Jeffrey Popyack, Viktor Skormin. Integrated Multi-Agent Information Security System: Mechanisms of Agents' Operation and Learning. Proceedings of the Fifth International Conference on the Practical Application of Intelligent Agents and Multi-Agent Technology. PAAM' 2000. PA EXPO 2000. Manchester. UK. Practical Application Company Ltd. 2000. P.151-154.
  2. Vladimir Gorodetski, Igor Kotenko, Oleg Karsaev. Framework for Ontology-based Representation of Distributed Knowledge in Multiagent Network Security System. Proceedings of the 4th World Multi-conference on Systems, Cybernetics and Informatics (SCI-2000), Vol. III: "Virtual Engineering and Emergent Computing". Orlando, USA, July 2000. P.52-58.
  3. Vladimir Gorodetsky, Igor Kotenko, Oleg Karsaev. Multi-Agent Information Security System in Computer Networks: Mechanisms of Learning and Decision Making for Intrusion Detection. Inter-regional Conference "Information Security of Russia Regions". Proceedings. Saint-Petersburg, 2000. P.97-104. (in Russian).
  4. Vladimir Gorodetski, Igor Kotenko, Oleg Karsaev. Multi-agent Network Security System: Mechanisms of Learning and Decision Making for Intrusion Detection. "Problemy Informatizatsiy", 2, 2000. P.67-73. // https://www.elibrary.ru/item.asp?id=47322480 (in Russian).
  5. Igor Kotenko. Models and algorithms of the guaranteed time support for problem solving by knowledge-based systems. International Conference on Soft Computing and Measurements. SMC'2000. Proceedings. Saint-Petersburg, 2000. P.254-257. (in Russian).
  6. Igor Kotenko, V.Golodnov, N.Lihvanzev, M.Zabadani. New Information Technologies for Decision Support Systems in design and Planning of Telecommunication Systems. VI International Conference on Informational Networks and Systems. ISINAS-2000. LONIIS, SUT. St.Petersburg, 2000. P.135-146. (in Russian).
  7. Vladimir Gorodetsky, Igor Kotenko, Oleg Karsaev, Aleksey Khabalov. Multi-agent Technologies of Integrated Assurance in Telecommunication Networks. VI International Conference on Informational Networks and Systems. ISINAS-2000. LONIIS, SUT. St.Petersburg, 2000. P.122-134. (in Russian).
  8. Vladimir Gorodetsky, Igor Kotenko, Oleg Karsaev. Intelligent Agents for Attack Detection in Computer Networks. CAI'2000. VII National conference with international involvement on Artificial Intelligence Proceedings. Moscow, 2000. P.771-779. (in Russian).
  9. V.I. Gorodetsky, O.I. Karsaev, I.V. Kotenko, A.V. Khabalov. Model of a multi-agent information security system // Izvestia TRTU. 2000. No. 2 (16). pp. 322. // https://www.elibrary.ru/item.asp?id=12854276 (in Russian).
  10. I. V. Kotenko, N.A. Likhvantsev, M.A. Zabadani. Intellectualization of expert criticism procedures in automated design // Izvestiya TRTU. 2000. No. 2 (16). p. 336.// https://www.elibrary.ru/item.asp?id=12854293 (in Russian).

1999

  1. Igor Kotenko. Uncertainty Processing for Monitoring Large-Scaled Distributed Systems // . SMC-99. . : , 1999, Vol.1 P.89-93
  2. Igor Kotenko. Application of Hybrid Agent-Based Technology for Design of Telecommunication Systems // Proceedings of the First International Workshop of Central and Eastern Europe on Multi-agent Systems. CEEMAS'99. St. Petersburg,1999. P.139-153.
  3. Vladimir Gorodetsky,Igor Kotenko,Jeffrey Popyack,Victor Skormin . Agent-based Model of Information Security System: Architecture and Formal Framework for Coordinated Behavior Specification // Proceedings of the First International Workshop of Central and Eastern Europe on Multi-agent Systems. CEEMAS'99. St. Petersburg.1999. P.113-123.
  4. Vladimir Gorodetsky,Igor Kotenko,Jeffrey Popyack,Victor Skormin. Ontology-Based Multi-Agent Model of an Information Security System // Lecture Notes in Artificial Intelligence, V.1711. New Directions in Rough Sets, Data Mining, and Granular-Soft Computing. 7th International Workshop, RSFDGrC'99. Yamaguchi, Japan. November 1999. Proceedings. P.528-532.
  5. Vladimir Gorodetsky ,Igor Kotenko, Jeffrey Popyack, Victor Skormin. Multi-Agent Integrated Information Security System for Computer Networks: Architecture and Agent Interaction // Proceedings of the Second International Scientific Conference in the Republic of Kazakhstan on Informative Technologies and Control (KazITC'99). December 6-10, 1999. Almaty, Kazakhstan. P.286-305.
  6. V.I. Gorodetsky, I.V. Kotenko. Architecture of basic agents of a multi-agent information protection system in computer networks // Izvestiya TRTU. 2000. No. 2 (16). pp. 38-51 // https://www.elibrary.ru/item.asp?id=12854203 (in Russian).

1994

  1. I.V. Kotenko. Conflict resolution in computer-supported cooperative design // Lecture Notes in Computer Science. 1994. . 876 LNCS. . 152-163. DOI: 10.1007/3-540-58648-2_34 // https://www.elibrary.ru/item.asp?id=31076797

Top 

RUSSIA, 199178, Saint-Petersburg, liniya 14-ya, 39, SPC RAS (metro station Vasileostrovskaya).
+7-(812)-328-7181, +7-(812)-328-2642, ivkote[AT]comsec[DOT]spb[DOT]ru

Comments? Questions? chechulin[AT]comsec[DOT]spb[DOT]ru

Locations of visitors to this page