| News | Staff | Projects | Awards | Patents | Results | Conferences | Collaboration | Publications | Events | Matherials | Links |
 | Contacts |
rus | eng |
  


Personal | Interests | Courses | PhD Students | Projects | Results | Activities | Membership | Awards |  Patents and Programms |  Publications | 

Kotenko Igor Vitalievich

Citizenship: Russia
Address academic (office):
St.Petersburg Institute for Informatics and Automation of the Russian Academy of Sciences
39, 14th Liniya, St.-Petersburg, 199178, Russia
Tel.: +7-(812)-328-2642
Fax: +7-(812)-328-4450
Current position: Head of Laboratory of Computer Security Problems, SPIIRAS
Previous position: Leading Researcher of Intelligent Systems Laboratory, SPIIRAS

Igor Vitalievich Kotenko, Prof. of Computer Science, Head of Laboratory of Computer Security Problems, St. Petersburg Institute for Informatics and Automation of the Russian Academy of Science. Graduated with honors from St. Petersburg Academy of Space Engineering (Department of Telecommunication and Computer-Aided Systems) (1983) and St. Petersburg Signal Academy (Department of Computer-Aided systems) (1987), received his Ph.D. degree (1990) and Doctor of Technical Sciences degree (1999) in the area "Telecommunication Systems Control", professor of computer science since 2001. Main publications are related to the areas of Computer network security, Artificial intelligence, Multi-agent systems, Telecommunication systems control, Computer-aided decision support.

E-mail: ivkote[AT]comsec[DOT]spb[DOT]ru
http://comsec.spb.ru/kotenko/

Top 

Research interests

  • Computer network security, including security policy management, access control, authentication, network security analysis, intrusion detection, firewalls, deception systems, malware protection, verification of security systems, digital right management, modeling, simulation and visualization technologies for counteraction to cyber terrorism;
  • Artificial intelligence, including multi-agent frameworks and systems, agent-based modeling and simulation, soft and evolutionary computing, machine learning, data mining, data and information fusion;
  • Telecommunications, including decision making and planning for telecommunication systems.

Top 

Courses Taught

Taught a multitude of graduate and undergraduate courses at the St.-Petersburg Signal Academy, and St.-Petersburg Herzen State Pedagogical University:
  • Informatics, Computer-aided Systems,
  • Computer-Aided Decision Support,
  • Applied Mathematics,
  • Programming Languages,
  • Software Development,
  • Databases,
  • Discrete Mathematics,
  • Internet Technologies,
  • Control Theory in Military Systems,
  • Information and Network Security,
  • etc.

Top 

PhD Students

Research directions of PhD Students:
  • Bogdanov Vitaly Sergeevich - "Models and a technique of proactive monitoring of security policy performance in computer networks";
  • Desnitsky Vasiliy Alexeevich - “Configuring of secure embedded devices based on resource indicators” (Specialty: 05.13.19 — Methods and systems of information security, information assurance). Defense date – June 25, 2013. Supervisor – Igor Kotenko.;
  • Doynikova Elena Vladimirovna - "Determining security risks of computer networks on the base of attack graph analysis";
  • Sidelnikova Ekaterina Viktorovna - "Detection and resolution of security policy conflicts on the basis of event calculus";
  • Polubelova (Chervatuk) Olga Vitalievna - “Verification of filtering rules of firewalls based on application of Model Checking” (Specialty: 05.13.19 — Methods and systems of information security, information assurance). Defense date - June 25, 2013.;
  • Komashinskiy Dmitry Vladimirovich – “Techniques to identify potentially malicious file objects based on data mining” (Specialty: 05.13.19 — Methods and systems of information security, information assurance). Defense date - December 25, 2013. ;
  • Konovalov Aleksey Michailovich – “Modeling and simulation of network attacks and defense mechanisms against them”;
  • Reznik Sergey Pavlovich – “Verification of security protocols”;
  • Chechulin Andrey Alexeevich – “Design and analysis of computer network attack trees taking into account the requirements of operativeness” (Specialty: 05.13.19 — Methods and systems of information security, information assurance). Defense date - December 25, 2013.;
  • Shorov Andrey Vladimirovich - “Simulation of mechanisms for the protection of computer networks from infrastructural attacks on the base of the approach "Nervous system of the network” (Specialty: 05.13.19 — Methods and systems of information security, information assurance). Defense date – April 17, 2012.;
  • Stepashkin Mikhail Viktorovich – “ Models and a technique of computer networks security analysis on the basis of attack graph construction”;
  • Ulanov Alexander Vladimirovich – “Multiagent modelling and simulation of DDoS attacks and protection mechanisms”;
  • Vorontsov Victor Vasilievich – “Automatic detection and prevention of virus attacks on the basis of combined mechanisms of network traffic restriction”.

Top 

The main scientific results received in 2005-2013

  • The formal statement of the research problem and the basic requirements to the components realizing the intelligent security mechanisms and the life cycle support of distributed protected computer systems were offered. The principles of construction, structure and a fragment of the distributed knowledge base for intelligent security mechanisms based on subject domain ontology, and the life cycle support environment of distributed protected computer systems are developed. The formal models of particular components of intelligent security mechanisms and the life cycle support environment of distributed protected computer systems are developed. In particular, the components for the specification of security policies and protected system (network) configuration, security policy verification, determination of security level and monitoring of security policy performance are suggested.
  • The general approach to verification of security policy of corporate computer networks based on hybrid multi-modular architecture of verification system, the models of particular verification components and a verification system software were developed. Using the advantages of multi-modular architecture, the approach allows combining general purpose modules with specialized methods. General purpose modules are constructed on the basis of theorem proving (with use of Event Calculus) and model checking methods. They allow processing the contradictions of various types, including dynamic ones. The specialized methods are directed on more effective processing of contradictions of concrete types.
  • The models of computer attacks and malefactor, attack tree formation and an estimation of computer network security level were developed. As against existing models, the model of computer attacks allows to use for representation of attack actions both expert knowledge and open databases of vulnerabilities. The malefactor model allows taking into account not only the malefactor’s rights on network computers and the host from which he realizes attack actions, but also the level of knowledge and skills of malefactor, and also his primary knowledge about an attacked network. The important feature of the given models is also the account of malefactor’s characteristics at attack scripts formation. The model of attack tree formation analyses the dependences of pre-conditions and post-conditions of attack actions. The given model possesses the following features: the attack tree nodes are represented as three , that allows to define the concepts “attack trace” and “threat”; at construction of attack tree the network traffic filtering rules which are set on firewalls are obviously taken into account. The model of an estimation of computer network security level uses the Common Vulnerability Scoring System (CVSS) approach for determining the primary security parameters, that considerably simplifies their calculation, and for defining the qualitative integrated security parameter of computer network, the combination of the CVSS approach and the Facilitated Risk Analysis and Assessment Process (FRAAP) techniques of risk analysis is used.
  • The automated technique of detailed analysis of computer network security was developed. It possesses the following features: it uses the uniform approach (based on construction and analysis of attack tree) both for a network design and its operation stages; the basic stages of the technique are automated; the active security analysis software (capable to break the functioning of particular services or a network as a whole) is not used. The developed technique allows: to take into account a variety of initial locations of malefactor, his knowledge about an attacked network; to use for analysis not only computer network configuration, but also the rules of security policy implemented; to take into account various types of attack actions; to use present-day open vulnerabilities databases; to calculate a set of parameters describing computer network security a as a whole and its particular components; to define computer network security “bottlenecks”, i.e. the hosts responsible for most of attack traces and vulnerabilities; to determine an integrated parameter of network security.
  • The software of computer network security analysis which is based on the offered security analysis models and technique was developed. Carrying out of experiments with test computer networks has shown the serviceability and higher efficiency of this software in comparison with existing similar systems.
  • The models and software prototype of proactive monitoring of security policy performance in computer networks were developed. Offered models of security policy monitoring are based on the active imitation of users’ actions (both legal and forbidden by security policy) and determining the divergences of system reactions from predefined. As against relevant research, the given approach is applicable to various categories of security policy (authentication, access control and authorization, filtering, channel protection, etc.). The models are based on optimizing the test influence sequence which involves the following aspects: removal of superfluous test influences; finding the optimum test influence sequence; determining the test influence subsequences which can be carried out in parallel. The approach is based on planning and generating a set of scripts for carrying out security policy monitoring, use of the distributed set of scanners, gathering and correlation of the information received from them. The offered models and software components allow carrying out checking the conformity of security policy specified at a design stage, to its realization in real network (system), and also the analysis of adequacy of this policy to the goals of protecting the information resources of computer system from the current security threats.
  • The models of agent teams realizing attacks “Distributed Denial of Service (DDoS)” and mechanisms of protection against them, and also the models of teams interaction were developed. The models of agent teams differ in use as basis of agent teamwork methods. The peculiarity of these models is applying the procedures of action coordination, monitoring and restoration of agent functionalities, and also communications selectivity. The distinctive features of the models of agent teams’ interaction: the representation of various kinds of teams’ interactions which are based on antagonistic counteraction, cooperation and adaptation; the use of various methods of defense agent teams’ cooperation which allow defense agents to exchange the traffic data and to involve different classes of defense agents; an opportunity of agent teams’ adaptation by means of generating new exemplars of attacks and defense mechanisms and scripts of their realization.
  • The technique of multiagent simulation of defense mechanisms against DDoS attacks in the Internet (based on the models of agent teams and their interactions) was developed. The peculiarities of the technique: it takes into account the key parameters of investigated processes (the parameters of a network and its hosts, the parameters of attack team and attack realization, the parameters of defense team and defense mechanisms, the parameters of teams’ interaction, etc.); the basic stages of the technique are automated; on the basis of output parameters the estimation and comparison of various defense mechanisms is made. The developed models and technique can be generalized for solving a big class of problems, in particular, problems of information counteraction in the Internet, competition in sphere of electronic business, etc. The offered technique can be used for investigating the efficiency of various defense mechanisms, estimating the security of existing networks and developing the recommendations for construction of perspective defense systems.
  • The further enhancement of software realization of research environment for investigation of DDoS attacks and defense mechanisms against them (based on agent-based and network packet-based simulation of network security processes) was fulfilled. For realization of the research environment, the simulation system architecture is used. It includes the Base Simulation System, the Internet Simulation Framework, the Multi-agent Simulation Framework and the Module (Library) for DDoS attacks and defense mechanisms against them. The designed simulation environment allows carrying out various experiments to investigate DDoS attack strategies and prospective defense mechanisms. Experiments on research of cooperative defense mechanisms have been carried out. These experiments have included the simulation of such distributed defense mechanisms as DefCOM, COSSACK, “without cooperation”, “cooperation at a level of filters”, “cooperation at a level of samplers”, “full cooperation”. Various adaptive methods of agent teams’ interaction have been also investigated.
  • The proactive approach to protection against network worms was developed. It is based on the combination of various mechanisms of detection and containment of network worms and automatic adjustment of key parameters of defense mechanisms according to the current network configuration and the network traffic. For development of the proactive approach it is offered to use a combination of the following features: the “multi-resolution” approach which combines the use of several time intervals (“windows”) of network traffic supervision and the application of various thresholds for traced parameters; the hybrid approach consisting in the use of various algorithms and mathematical methods; the multilevel combination of algorithms as a system of base qualifiers processing the traffic data, and the meta-qualifier which chooses the decision; the adaptive mechanisms of detection and containment of network worms capable to change the criterion of detection on the basis of network traffic parameters. The software of simulation and evaluation of detection and containment of network worms was developed. It includes the following components: the traffic sources or the traffic generator (which forms the normal traffic and the network worm traffic); the traffic analyzer; the libraries of defense mechanisms against network worms; testing scenarios and the base test complex or estimation component. A series of experiments for the choice of optimum parameters of defense mechanisms was fulfilled.
  • The models of software protection based on the mechanism of remote trust were investigated. This mechanism is intended for detection of non-authorized changes of a client program functioning in potentially hostile environment, and also the possible classes of attacks to the specified defense mechanisms. The mechanism of the mobile module replacement in the client program is offered. It is based of the concept of aspect-oriented programming according to which various functionalities of the client program are programmed separately, and then are built in the target code.
  • The theoretical basis and operation algorithms of deception systems (DS) were developed. These systems represent hardware-software tools for information protection that are based on the technology of “traps” and false targets. In particular, we developed the requirements to DS, the generalized architecture of multi-agent DS, the generalized models and algorithms of disguised counteraction to remote non-authorized access to information resources, including the models of malefactor detection and readdressing of non-authorized request to false components, determining the malefactor plan (strategy), generating a plan of false components operation, etc. The offered approach is based on simulation of information systems components and on using three levels of malefactor deception: (1) a network segment level – the whole network segment is emulated; (2) a host level – among working servers the bait-host is used; (3) a services and applications level –the programs emulating services and applications are applied on servers. The deception software system was implemented. We fulfilled a set of experiments on investigating basic deception functions at realization of different attacks. These experiments are executed on several different scenarios determined according to various attack types.

Top 

Professional activities

Serving as PC member of International and Russian conferences:

2014

  • The 22th International Euromicro Conference on Parallel, Distributed and Network-based Processing (PDP 2014). Turin, Italy. February 12-14, 2014. http://www.pdp2014.org (PC Member).
  • Special session “Security in Networked and Distributed Systems” (SNDS 2014). PDP 2014. Turin, Italy. February 12-14, 2014. http://www.comsec.spb.ru/SNDS14/ (PC Chair).
  • The 6-th International Conference on Agents and Artificial Intelligence (ICAART 2014). Angers, Loire Valley, France. March 6 - 8, 2014. http://www.icaart.org (PC Member).
  • The 16th Conference “RusCrypto 2014” on Cryptology, Steganography, Digital Signature and Security Systems. Solnechnegorsk, Russia. March 25-28, 2014. http://www.ruscrypto.ru (Session moderator).
  • The 2014 Asian Conference on Availability, Reliability and Security (AsiaARES 2014). Bali, Indonesia. April 14-17, 2014. http://www.asiaares.org/ (PC Member).
  • The First International Workshop on Agents and CyberSecurity (ACySe 2014). To be held with thr Autonomous Agents and Multi-Agent Systems Conference (AAMAS 2014). Paris, France. May 5-9, 2014. http://sites.google.com/site/acyseaamas2014/ (PC Member).
  • The Tenth European Dependable Computing Conference (EDCC-2014). Newcastle, UK. May 13-16, 2014. http://edcc.dependability.org/ (PC Member).
  • The First International Workshop on Real-time Big Data Analytics for Critical Infrastructure Protection (BIG4CIP 2014). Newcastle upon Tyne, UK. May 13-16, 2014. http://www.big4cip.org/ (PC Member).
  • The International Workshop on Cyber Crime (IWCC 2013). Co-located with The 34th IEEE Symposium on Security and Privacy (IEEE S&P 2013). San Jose, CA, USA. May 17-18, 2014. http://stegano.net/IWCC2014 (PC Member).
  • The 28th European Conference on Modelling and Simulation (ECMS 2014). Brescia, Italy. May 27 – 30, 2014. http://www.scs-europe.net/conf/ecms2014/ (PC Member).
  • The 6th International Conference on Cyber Conflict 2014 (CyCon 2014). Tallinn, Estonia. June 3-6, 2014. http://ccdcoe.org/cycon/ (PC Member).
  • The 9th International Workshop on Digital Forensics and Incident Analysis (WDFIA 2014). Plymouth, UK. July 8-10, 2014. http://www.wdfia.org/ (PC Member).
  • IEEE International Conference on Communications (IEEE ICC 2014). Communications and Information Systems Security Symposium (CISS 2014). Sydney, Australia. June 16-20, 2014. http://www.ieee-icc.org/2014 (PC Member).
  • The Sixth International Conference on Evolving Internet (INTERNET 2014). Seville, Spain. June 22-26, 2014. http://www.iaria.org/conferences2014/INTERNET14.html (PC Member).
  • The IADIS Intelligent Systems and Agents 2014 (ISA 2014). Lisbon, Portugal. July 15-17, 2014. http://www.isa-conf.org/ (PC Member).
  • The 8th International Symposium on Intelligent Distributed Computing (IDC 2014). Madrid, Spain. September 3-5, 2014. http://aida.ii.uam.es/IDC2014 (PC Member).
  • The 6th International Workshop on Reliable Networks Design and Modeling (RNDM 2014). St. Petersburg, Russia. September 3-5, 2014. http://www.rndm.pl/2014/ (PC Member).
  • International Symposium on Multimedia Applications and Processing (MMAP 2014). Warsaw, Poland. September 7-10, 2014. http://www.fedcsis.org/ (PC Member).
  • The International Conference on Emerging Intelligent Data and Web Technologies (EIDWT 2014). Salerno, Italy. September 10-12, 2014. http://voyager.ce.fit.ac.jp/conf/eidwt/2014/ (Track Co-chair).
  • The 14th International Conference on Cyberworlds (Cyberworlds 2014). Santander, Spain. October 6-8, 2014. http://www.cw2014.unican.es (PC Member).
  • The Third International Conference on Communications, Computation, Networks and Technologies (INNOV 2014). Nice, France. October 12-16, 2014. http://www.iaria.org/conferences2014/INNOV14.html (PC Member).

2013

  • International Conference on Computing, Networking and Communications. Communications and Information Security Symposium (ICNC'13 - CIS). San Diego, USA. January 28-31, 2013. http://www.conf-icnc.org/ (PC Member).
  • 5th International Conference on Agents and Artificial Intelligence (ICAART 2013). Barcelona, Spain. February 15-18, 2013. http://www.icaart.org (PC Member).
  • The 21th International Euromicro Conference on Parallel, Distributed and Network-based Processing (PDP 2013). Belfast, Northern Ireland, UK. 27th February – 1st March 2013. http://www.pdp2013.org (PC Member).
  • Special session “Security in Networked and Distributed Systems” (SNDS 2013). PDP 2013. Belfast, Northern Ireland, UK. 27th February – 1st March 2013. http://www.comsec.spb.ru/SNDS13/ (PC Chair).
  • Ninth International Conference on Networking and Services (ICNC'13). Lisbon, Portugal. March 24 - 29, 2013. http://www.iaria.org/conferences2013/ICNS13.html (PC Member).
  • The Ninth International Conference on Autonomic and Autonomous Systems (ICAS 2013). Lisbon, Portugal. March 24-29, 2013. http://www.iaria.org/conferences2013/ICAS13.html (PC Member).
  • The 15th Conference “RusCrypto 2013” on Cryptology, Steganography, Digital Signature and Security Systems. Solnechnegorsk, Russia. March 28-30, 2013. http://www.ruscrypto.ru (Session moderator).
  • The 8th International Annual Workshop on Digital Forensics & Incident Analysis (WDFIA 2013). Lisbon, Portugal. May 8-10, 2013. http://www.wdfia.org/ (PC Member).
  • The 6th International Workshop on Information Fusion and Geographical Information Systems: Environmental and Urban Challenges (IF&GIS’ 2013). St.Petersburg, Russia, May 12-15, 2013. http://if-gis.com/ (PC Member).
  • The 7th International Conference "Integrated models and soft computing in Artificial Intelligence". Kolomna, Russia. May 20-22, 2013. http://imscai.rk9.bmstu.ru/ (PC Member).
  • International forum on practical information security “Positive Hack Days”. PHD Young School 2013. Moscow. May 23-24, 2013. http://phdays.com/ (PC Member).
  • The International Workshop on Cyber Crime (IWCC 2013). Co-located with The 34th IEEE Symposium on Security and Privacy (IEEE S&P 2013). San Francisco, May 25, 2013. http://stegano.net/IWCC2013/ (PC Member).
  • The 27th European Conference on Modelling and Simulation (ECMS 2013). Aalesund University College, Norway. May 27 - May 30st, 2013. http://www.scs-europe.net/conf/ecms2013/ (PC Member).
  • The Arab International Conference on Computer Systems and Applications (AICSSA'2013). The track "Security and privacy". Ifrane, Morocco. May 27-30, 2013. http://aiccsa.uic.edu/ (PC Member).
  • The 5th International Conference on Cyber Conflict 2013 (CyCon 2013). Tallinn, Estonia. June 4-7, 2013. http://ccdcoe.org/cycon/ (PC Member).
  • The 1st IEEE Workshop on Intelligent Data Analysis with Applications in Information Retrieval and Machine Learning (IDAIR). Sesimbra, Portugal. June 26-28, 2013. http://iimss-13.kesinternational.org/cms/user/ISdisplay.php (PC Member).
  • 5th International Conference on Personal Satellite Services (PSATS 2013). Toulouse, France. June 27–28, 2013. http://www.psats.eu/ (PC Member).
  • The Fifth International Conference on Evolving Internet (INTERNET 2013). Nice, France. July 21 - 26, 2013. ttp://www.iaria.org/conferences2013/INTERNET13.html (PC Member).
  • The IADIS Intelligent Systems and Agents 2013 (ISA 2013). Prague, Czech Republic, July 22-24, 2013. http://www.isa-conf.org/ (PC Member).
  • The 7th International Symposium on Intelligent Distributed Computing (IDC 2013). Prague, Czech Republic. September 4-6, 2013. http://www.ksi.mff.cuni.cz/IDC2013/ (PC Member).
  • International Symposium on Multimedia Applications and Processing (MMAP 2013). Krakow, Poland, September 8-11, 2013. http://www.fedcsis.org/ (PC Member).
  • 5th International Workshop on Reliable Networks Design and Modeling (RNDM 2013). Almaty, Kazakhstan. September 24-27, 2013. http://www.rndm.pl (PC Member).
  • The 5th International Congress on Ultra Modern Telecommunications and Control Systems (ICUMT 2013). Almaty, Kazakhstan. September 10-13, 2013. http://www.icumt.org (PC Member).
  • The IEEE 7th International Conference on “Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications” (IDAACS'2013). Berlin, Germany, September 12-14, 2013. http://idaacs.net/ (PC Member, Stream co-chair).
  • 12th International Conference on Intelligent Software Methodologies, Tools and Techniques. Budapest, Hungary. September 22-24, 2013. http://conf.uni-obuda.hu/somet2013/ (PC Member).
  • The 13th International Conference on Cyberworlds (Cyberworlds 2013). Yokohama, Japan. October 21-23, 2013. http://www.vc.media.yamanashi.ac.jp/cw2013/ (PC Member).
  • VIII St.Petersburg Interregional Conference “Information Security of Russian Regions (ISRR-2013)”. St.Petersburg, Russia. October 23-25, 2013. http://spoisu.ru/conf/ibrr2013 (PC Member).
  • 13th International Conference on Telecommunications for Intelligent Transport Systems (ITST 2013). Tampere, Finland. October 16-18, 2013. http://www.itst2013.org (PC Member).
  • The 8th International Conference on Risks and Security of Internet and Systems (CRiSIS 2013). La Rochelle, France. October 23-25, 2013. http://secinfo.msi.unilim.fr/crisis2013/ (PC Member).
  • The 11th IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC 2013) - Security and Fault Tolerance Applications Track. Zhangjiajie, China. November 13-15, 2013. http://trust.csu.edu.cn/conference/euc2013/ (PC Member).
  • The Second International Conference on Communications, Computation, Networks and Technologies (INNOV 2013). Lisbon, Portugal. November 17-22, 2013. http://www.iaria.org/conferences2013/INNOV13.html (PC Member).
  • The 2nd International Conference on Connected Vehicles & Expo (ICCVE 2013). Las Vegas, Nevada, USA. December 2-6, 2013. http://www.ICCVE.org (PC Member).
  • The 13th IEEE International Conference on Computer and Information Technology, Sydney, Australia. December 3-5, 2013. http://www.swinflow.org/confs/cit2013 (PC Member).
  • International Conference on Mathematics and Computing (ICMC 2013). Haldia, India. December 26-29, 2013. http://hithaldia.in/icmc2013 (PC Member).

2012

  • International Conference on Computing, Networking and Communications. Communications and Information Security Symposium (ICNC'12 - CIS). Maui, Hawaii. January 30 – February 2, 2012. http://www.conf-icnc.org/ (PC Member).
  • 4th International Conference on Agents and Artificial Intelligence (ICAART 2012). Vilamoura, Algarve, Portugal. February 6-8, 2012. http://www.icaart.org (PC Member).
  • 20th Euromicro International Conference on Parallel, Distributed and network-based Processing (PDP 2012). Garching near Munich, Germany. February 15-17, 2012. http://www.pdp2012.org (PC Member).
  • Special session “Security in Networked and Distributed Systems” (SNDS 2012). PDP 2011. Garching near Munich, Germany. February 15-17, 2012. http://www.comsec.spb.ru/SNDS12/ (PC Chairman).
  • The 4th International ICST Conference on Personal Satellite Services (PSATS 2012). Bradford, United Kingdom. March 22-23, 2012. http://www.psats.eu/ (PC Member).
  • The Eighth International Conference on Networking and Services (ICNS 2012). St. Maarten, Netherlands Antilles. March 25-29, 2012. http://www.iaria.org/conferences2012/ICNS12.html (PC Member).
  • 9th European Dependable Computing Conference (EDCC-2012). Sibiu, Romania. May 8-11, 2012. http://edcc.dependability.org/ (PC Member).
  • 26th European Conference on Modelling and Simulation (ECMS 2012). Koblenz, Germany. May 29 - June 1st, 2012. http://www.scs-europe.net/conf/ecms2012/index.html (PC Member).
  • 7th International Annual Workshop on Digital Forensics & Incident Analysis (WDFIA 2012). Crete, Greece. June 6-8, 2012. http://www.wdfia.org/ (PC Member).
  • The 2012 IEEE World Congress on Computational Intelligence (IEEE WCCI 2012). Special Session on Computational Intelligence for Measurement Systems. Brisbane, Australia. June 10-15, 2012. http://www.ieee-wcci2012.org/ (PC Member).
  • International conference "Mathematical Methods, Models and Architectures for Computer Network Security 2012" (MMM-ACNS-2012). St. Petersburg, Russia. September 11-13, 2012. http://comsec.spb.ru/mmm-acns12/ (PC Co-Chair).
  • Second International Workshop "Scientific Analysis and Policy Support for Cyber Security" (SA&PS4CS 2012). St. Petersburg, Russia. September 14, 2012. http://www.comsec.spb.ru/saps4cs12 (PC Co-Chair).
  • The 2012 IEEE International Conference on Internet of Things (iThings 2012). Besancon, France. September 12-14, 2012. http://ieee-iot.org (PC Co-chair).
  • 6th International Symposium on Intelligent Distributed Computing (IDC 2012). Calabria, Italy. September 24-26, 2012. http://idc2012.deis.unical.it (PC Member).
  • The 12th International Conference on Cyberworlds (Cyberworlds 2012). Darmstadt, Germany. September 25-27, 2012. http://www.gris.tu-darmstadt.de/cw2012/ (PC Co-Chair).
  • 4th International Workshop on Reliable Networks Design and Modeling (RNDM 2012). St. Petersburg, Russia. October 3-5, 2012. http://www.rndm.pl (PC Member).
  • The 14th Conference “RusCrypto 2012” on Cryptology, Steganography, Digital Signature and Security Systems. Solnechnegorsk, Russia. March 28-30, 2012. http://www.ruscrypto.ru (Session moderator).
  • International forum on practical information security “Positive Hack Days”. PHD Young School 2012. Moscow. May 30-31, 2012. http://phdays.com/ (PC Member).
  • The IADIS Intelligent Systems and Agents 2012 (ISA 2012). Lisbon, Portugal, July 21-23, 2012. http://www.isa-conf.org/ (PC Member).
  • The 9th International Conference on Mobile Web Information Systems (MobiWIS 2012). Niagara Falls, Ontario, Canada, August 27-29, 2012. http://www.mobiwis.org/2012/ (PC Member).
  • The International Conference on Computer Convergence Technology (ICCCT 2012). Jeju Island, Korea. August 30 - September 1, 2012. http://www.kkits.or.kr/ICCCT2012/index.htm (PC Member).
  • International Symposium on Multimedia Applications and Processing (MMAP'2012). Wroclaw, Poland, September 9-12, 2012. http://www.fedcsis.org/mmap (PC Member).
  • The 15th Information Security Conference (ISC 2012). Passau, Germany, September 19-21, 2012. http://web.sec.uni-passau.de/isc2012/ (PC Member).
  • The 10 International Conference on Intelligent Software Methodologies, Tools, and Techniques (SOMET_12). Genoa (Italy), September 26-28, 2012. https://cmt.research.microsoft.com/SOMET2012/ (PC Member).
  • The International Conference on Ultra Modern Telecommunications (ICUMT 2012). St. Petersburg, Russia. October 3 - 5, 2012. http://www.icumt.org/ (PC Member).
  • The 5th Russian Multiconference on Problems of Control (MCPC-2012). The Conference "Information technology in Control" (ITC-2012). St.Petersburg. October 9–11, 2012. http://www.spiiras.nw.ru/conf/itu-2012/index.par (PC Member).
  • 12th International Conference on Telecommunications for Intelligent Transport Systems (ITST 2012). Taipei, Taiwan. November 5-8, 2012. http://www.itst2012.org/welcome.html (PC Member).
  • The 7th International Conference on Frontier of Computer Science and Technology - Trust, Security and Privacy Track. Suzhou, China, November 21-23, 2012. http://trust.csu.edu.cn/conference/FCST2012/ (PC Member).
  • The 2012 International workshop on Secure and Trust Computing (ST-COM 2012). Jeju, Korea. November 22 - 25, 2012. http://www.ftrai.org/csa2012 (PC Member).
  • Globecom 2012 - Communication and Information System Security Symposium. Anahem, California, USA, December 2012. http://www.ieee-globecom.org/ (PC Member).

2011

  • International Conference on Agents and Artificial Intelligence (ICAART 2011). Rome, Italy. January 28-30, 2011. http://www.icaart.org (PC Member).
  • Special session “Security in Networked and Distributed Systems” (SNDS 2011). PDP 2011. Ayia Napa, Cyprus. February 9-11, 2011. http://www.comsec.spb.ru/SNDS11/ (PC Chairman).
  • 19th Euromicro International Conference on Parallel, Distributed and network-based Processing (PDP 2011). Ayia Napa, Cyprus. February 9-11, 2011. http://www.pdp2011.org (PC Member).
  • 13th Conference “RusCrypto 2011” on Cryptology, Steganography, Digital Signature and Security Systems. Zvenigorod, Russia. March 30 – April 2, 2011. http://www.ruscrypto.ru (Session moderator).
  • The 2nd International Conference Ubiquitous Computing and Multimedia Applications (UCMA 2011). Daejeon, Korea. April 13-15, 2011. http://sersc.org/UCMA2011/index.php (PC Member).
  • The Fifth International Workshop “Information Fusion and Geographical Information: Towards the Digital Ocean” (IF&GIS-2011). Brest, France. May 10-11, 2011. http://if-gis.com/ (PC Member).
  • VI International Conference "Integrated Models and Soft Computing in Artificial Intelligence ". May 16-19, 2011. http://imscai.rk9.bmstu.ru/ (PC Member).
  • Third International Workshop on Network Steganography (IWNS 2011). Prague, Czech Republic. May 26-28, 2011. http://stegano.net/workshop (PC Member).
  • 25th European Conference on Modelling and Simulation (ECMS 2011). Krakow, Poland. June 7-10, 2011. http://www.scs-europe.net/conf/ecms2011/index.html (PC Member).
  • Communications and Information System Security Symposium (CISS 2011). Kyoto, Japan. 5-9 June, 2011. http://www.ieee-icc.org/2011/ (PC Member).
  • 6th International Annual Workshop on Digital Forensics & Incident Analysis (WDFIA 2011). London, UK. July 7-8, 2011. http://www.wdfia.org/ (PC Member).
  • IADIS Multi Conference on Computer Science and Information Systems (MCCIS 2011). Conference “INTELLIGENT SYSTEMS AND AGENTS (ISA2011)”. Rome, Italy. July 24 – 26, 2011. http://www.isa-conf.org/ (PC Member).
  • The 11th IEEE International Conference on Computer and Information Technology (CIT-11). Cyprus, August 31 - September 2, 2011. http://www.cs.ucy.ac.cy/CIT2011/ (PC Member).
  • International Conference on Mobile Learning, E-society & E-Management (ICMLEM 2011). Prague, Czech Republic. September 6-7, 2011. http://www.icedmat.com/ (PC Member).
  • IEEE Sixth International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS'2011). Prague, Czech Republic. September 15-17, 2011. http://idaacs.net/ (PC Member).
  • International Workshop on Agent Based Computing: from Model to Implementation VIII (ABC:MI'11). Szczecin, Poland, September 19-21, 2011. http://fedcsis.org/?q=node/18 (PC Member).
  • International Conference on Convergence and Hybrid Information Technology (ICHIT 2011). Daejeon, Korea. September 22-24, 2011. http://www.ichit2011.org (PC Member).
  • International Symposium on Multimedia Applications and Processing (MMAP 2011). Szczecin, Poland, September 19-21, 2011. http://mmap.fedcsis.org (PC Member).
  • The 10 International Conference on Intelligent Software Methodologies, Tools, and Techniques (SOMET_11). Saint Petersburg, Russia. September 28-30, 2011. http://www.somet.soft.iwate-pu.ac.jp/somet_11/ (PC Member).
  • The CYBERWORLDS International Conference (Cyberworlds 2011). Banff, Alberta, Canada. October 4-6, 2011 (Topic: Security). http://cw2011.cpsc.ucalgary.ca/ (PC Member).
  • 5rd International Symposium on Intelligent Distributed Computing (IDC 2011). Delft, The Netherlands. October 5-7, 2011. http://idc-2011.d-cis.nl/ (PC Member).
  • International Congress on Ultra Modern Telecommunications (ICUMT 2011). Budapest, Hungary. October 5-7, 2011. http://www.icumt.org/ (PC Member).
  • 3d International Workshop on Reliable Networks Design and Modeling (RNDM 2011). Budapest, Hungary. October 5-7, 2011. http://www.rndm.pl (PC Member).
  • The 16th Nordic Conference in Secure IT Systems (NordSec 2011). Tallinn, Estonia. October 26-28, 2011. http://nordsec2011.cyber.ee/index.html (PC Member).
  • VII St.Petersburg Interregional Conference “Information Security of Russian Regions (ISRR-2011)”. St.Petersburg, Russia. October 26-28, 2011. http://spoisu.ru/conf/ibrr2011 (PC Member).
  • The 6th International Conference on Frontier of Computer Science and Technology, Wireless Sensor Networks and Mobile Computing Track (FCST 2011). Changsha, China. November 16-18, 2011. http://trust.csu.edu.cn/conference/fcst2011/ (PC Member).
  • First International Workshop on Digital Forensics (IWDF 2011). Shanghai, China. November 4-6, 2011. http://iwdf.org (PC Member).
  • The 2011 International Workshop on Secure and Trust Computing (ST Com-11). Jeju, Korea. December 12-15, 2011. http://web.ftrai.org/st-com2011 (PC Member).
  • The 2011 FTRA International Symposium on Advances in Cryptography, Security and Applications for Future Computing (ACSA-11). Jeju, Korea. December 12-15, 2011. http://www.ftrai.org/wcc2011/acsa (PC Member).
  • Conference "Information security: Nevsky dialogue - 2011". St.Petersburg, Russia. November 16, 2011. http://iscs-expo.primexpo.ru/22/40107 (PC Member).
  • The 5th Indian International Conference on Artificial Intelligence (IICAI-11). Tumkur, India. December 14-16, 2011. http://www.iiconference.org (PC Member).

2010

  • International Conference on Agents and Artificial Intelligence (ICAART 2010). Valencia, Spain. January 22-24, 2010. http://www.icaart.org (PC Member).
  • Special session “Security in Networked and Distributed Systems” (SNDS 2010). PDP 2010. Pisa, Italy. February 17-19, 2010. http://www.comsec.spb.ru/snds10/ (PC Chairman).
  • 18th Euromicro International Conference on Parallel, Distributed and network-based Processing (PDP 2010). Pisa, Italy. February 17-19, 2010. http://www.pdp2010.org (PC Member).
  • 12th Conference “RusCrypto 2010” on Cryptology, Steganography, Digital Signature and Security Systems. Zvenigorod, Russia. April 1-4, 2010. http://www.ruscrypto.ru (Session moderator).
  • The Fifth Annual Workshop on Digital Forensics and Incident Analysis (WDFIA 2010). Port Elizabeth, South Africa, May 17-18, 2010. http://www.wdfia.org/ (PC Member).
  • The First International Symposium on Ubiquitous & Trusted Computing (UTC 2010). Busan, Korea, May 21-23, 2010. http://grid.hust.edu.cn/utc2010/ (PC Member).
  • 24th European Conference on Modelling and Simulation (ECMS 2010). Kuala Lumpur, Malaysia. June 1st - 4th, 2010. http://www.scs-europe.net/conf/ecms2010/index.html (PC Member).
  • The First International Conference on Ubiquitous Computing and Multimedia Applications (UCMA 2010). Kolkata, India, June 3-5, 2010. http://www.sersc.org/UCMA2010/ (PC Member).
  • The 4th International Conference on Multimedia and Ubiquitous Engineering (MUE 2010). Cebu, Philippines, August 11 - 13, 2010. http://www.ftrg.org/mue2010 (PC Member).
  • The Fifth International Conference “Mathematical Methods, Models and Architectures for Computer Networks Security” (MMM-ACNS-2010)”. St.Petersburg, Russia. September 6-8, 2010. http://comsec.spb.ru/mmm-acns10/ (PC Co-Chairman).
  • International Workshop “Scientific Analysis and Policy Support for Cyber Security” (SAPSCS 2010). St.Petersburg, Russia. September 9, 2010. http://www.comsec.spb.ru/saps4cs10/ (PC Co-Chairman)
  • 4rd International Symposium on Intelligent Distributed Computing (IDC 2010). Tangier, Morocco. September 16-18, 2010. http://www.ieee.ma/~idc2010/index.html(PC Member).
  • The Third International Symposium on Multimedia – Applications and Processing (MMAP 2010). Wisla, Poland, October 18-20, 2010. (PC Member).
  • The 4rd International Workshop on Secure Information Systems (SIS'10). Wisla, Poland. October 18-20, 2010. http://2010.imcsit.org/pg/309/251 (PC Member).
  • International Congress on Ultra Modern Telecommunications (ICUMT 2010). Moscow, Russia, 18-20 October, 2010. http://www.icumt.org/ (PC Member).
  • 2nd International Workshop on Reliable Networks Design and Modeling (RNDM 2010). Moscow, Russia, 18-20 October, 2010. http://www.rndm.pl (PC Member).
  • The XII International Conference “Regional informatics-2010” (“RI-2010”), St. Petersburg, October 20-22, 2010. http://www.spiiras.nw.ru (PC Member).
  • The CYBERWORLDS International Conference (Cyberworlds 2010). Singapore. October 20-22, 2010 (Topic: Security). http://www3.ntu.edu.sg/SCE/cw2010/cw2010.htm (PC Member).
  • The International Conference on Multimedia Information NEtworking and Security (MINES 2010). Nanjing, China, November 4-6, 2010. http://www.ieee-mines.org/ (PC Member).
  • Second International Workshop on Network Steganography (IWNS 2010). Nanjing, China. November 4–6, 2010. http://stegano.net/workshop (PC Member).
  • The FTRA 2010 International Symposium on Advances in Cryptography, Security and Applications for Future Computing (ACSA-10). Gwangju, Korea, December 9-11, 2010. http://www.ftrg.org/acsa2010/ (PC Member).
  • The 2010 International Conference on u- and e- Service, Science and Technology (UNESST2010). Jeju Island, Korea. December 13-15, 2010. http://www.sersc.org/UNESST2010/ (PC Member).

2009

  • International Conference on Bio-inspired Systems and Signal Processing (BIOSIGNALS 2009). Porto, Portugal. January 14-17, 2009. http://www.biosignals.org/ (PC Member).
  • 17th Euromicro International Conference on Parallel, Distributed and network-based Processing (PDP 2009). Weimar, Germany. February 18-20, 2009. http://www.pdp2009.org (PC Member).
  • Special session “Security in Networked and Distributed Systems” (SNDS 2009). PDP 2009. Weimar, Germany. February 18-20, 2009. http://www.comsec.spb.ru/SNDS09/ (PC Chairman).
  • IEEE Symposium on Computational Intelligence in Cyber Security (CICS 2009). Nashville, USA. 30 March – 2 April, 2009. http://www.ieee-ssci.org/index.php?q=node/21 (PC Member).
  • 11th Conference “RusCrypto 2009” on Cryptology, Steganography, Digital Signature and Security Systems. Zvenigorod, Russia. April 3-5, 2009. http://www.ruscrypto.ru (Session moderator).
  • The Fourth International Workshop “Information Fusion and Geographical Information Systems” (IF&GIS-2009). St.Petersburg, Russia. May 17-20, 2009 (Topic “Information Assurance and Protection in GIS”). http://www.oogis.ru/ (PC Member).
  • V-th International Conference "Integrated models and soft computing in Artificial Intelligence". Kolomna, Russia. May 28-30, 2009. http://imscai.rk9.bmstu.ru (PC Member).
  • The 3rd International Conference on Multimedia and Ubiquitous Engineering (MUE 2009). Qingdao, China. June 4-6, 2009 (Section “Multimedia and Ubiquitous Security”) http://grid.hust.edu.cn/mue09/ (PC Member).
  • 23rd European Conference on Modelling and Simulation (ECMS 2009). Madrid, Spain. June 9-12, 2009. http://www.scs-europe.net/conf/ecms2009/ (PC Member).
  • The Fourth Annual Workshop on Digital Forensics and Incident Analysis (WDFIA 2009). Athens, Greece, June 25-26, 2009. http://www.wdfia.org/ (PC Member).
  • 5th International Joint Conference on Networked Computing and Advanced Information Management (NCM 2009). Seoul, Korea. August 25-27, 2009. http://www.aicit.org/ncm (PC Member).
  • International Conference on Convergence and Hybrid Information Technology (ICHIT 2009). Daejeon, Korea. August 27–29, 2009. http://www.ichit2009.org (PC Member).
  • The CYBERWORLDS International Conference (Cyberworlds 2009). Bradford, UK. September 7-11, 2009 (Topic: Security). http://www.inf.brad.ac.uk/cw09 (PC Member).
  • 3rd International Symposium on Intelligent Distributed Computing (IDC 2009). Ayia Napa, Cyprus. September 12-14, 2009. http://www.idc2009.cs.ucy.ac.cy (PC Member).
  • The IEEE Fifth International Workshop on “Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications” (IDAACS'2009), Rende (Cosenza), Italy. September 21-23, 2009. http://www.idaacs.net/ (PC Member).
  • Second International Workshop on Remote Entrusting (RE-TRUST 2009). Riva del Garda, Italy. September 30 - October 1, 2009. http://www.re-trust.org (PC Member).
  • Second International Workshop on Security and Privacy in Wireless and Mobile Computing, Networking and Communications (SecPri_WiMob 2009). Marrakech, Morocco. October 12, 2009. http://www.icsd.aegean.gr/SecPri_WiMob_2009 (PC Member).
  • Second International Symposium on Multimedia – Applications and Processing (MMAP'09). Mragowo, Polland, October 12-14, 2009. http://www.mmap.imcsit.org (PC Member).
  • International Workshop on Reliable Networks Design and Modeling (RNDM 2009). St. Petersburg, Russia. October 12-14 2009. http://www.icumt.org/w-10.html (PC Member).
  • The Second International Conference on u- and e- Service, Science and Technology (UNESST2009). Melbourne, Australia. October 12-14, 2008. http://www.sersc.org/UNESST2009/ (PC Member).
  • VI St.Petersburg Interregional Conference “Information Security of Russian Regions (ISRR-2009)”. St.Petersburg, Russia. October 23-25, 2009. http://www.spiiras.nw.ru (PC Member).
  • The 6th International Workshop on Formal Aspects in Security&Trust (FAST2009). Eindhoven, Netherlands. November 5-6, 2009. http://www.win.tue.nl/fmweek/ (PC Member).
  • The First International Conference on Multimedia Information NEtworking and Security (MINES 2009), Wuhan, China, November 18-20, 2009. http://liss.whu.edu.cn/mines2009 (PC Member).
  • The First International Workshop on Network Steganography (IWNS 2009). Wuhan, Hubei, China, 18-20 November 2009. http://stegano.net/workshop/ , http://liss.whu.edu.cn/mines2009/ (PC Member).
  • International Workshop on Secure Multimedia Communication and Services (SECMCS'09). Wuhan, Hubei, China, 18-20 November 2009. http://liss.whu.edu.cn/mines2009/ (PC Member).
  • Fourth International Conference on Computer Sciences and Convergence Information Technology (ICCIT 2009). Seoul, Korea. November 24-26, 2009. http://www.aicit.org/iccit (PC Member).
  • 2009 FTRG International Workshop on Advances in Cryptography, Security and Applications for Future Computing (ACSA-09). Jeju, Korea, December 11-12, 2009. http://www.ftrg.org/acsa2009/ (PC Member).
  • The 4th Indian International Conference on Artificial Intelligence (IICAI-09). Tumkur, India. December 16-18, 2009. http://www.iiconference.org (PC Member).

2008

  • International Conference on Bio-inspired Systems and Signal Processing (BIOSIGNALS 2008). Funchal, Madeira, Portugal. January 28-31, 2008. http://www.biosignals.org/Biosignals2008/ (PC Member).
  • 16th Euromicro International Conference on Parallel, Distributed and network-based Processing (PDP 2008). Toulouse, France. February 13-15, 2008. http://www.pdp2008.org/ (PC Member).
  • Special session “Security in Networked and Distributed Systems” (SNDS 2008) on PDP 2008. Toulouse, France. February 14, 2008. http://www.comsec.spb.ru/SDS08/ (PC Member).
  • The 10th Conference “RusCrypto 2008” on Cryptology, Steganography, Digital Signature and Security Systems. Zvenigorod, Russia. April 3-5, 2008. http://www.ruscrypto.ru/ (Session moderator).
  • The 2nd International Conference on Multimedia and Ubiquitous Engineering (MUE 2008). Hanwha Resort Haeundae, Busan, Korea. April 24-26, 2008. (Section “Multimedia and Ubiquitous Security”). http://www.sersc.org/MUE2008/ (PC Member).
  • 2008 International Workshop on Multimedia Security in Communication (MUSIC'08) Hangzhou, China, August 25th-27th, 2008. http://home.simula.no/~yanzhang/MUSIC/ (PC Member).
  • 2008 International Conference on Hybrid Information Technology (ICHIT'08). Daejeon, Korea. August 28 - 30, 2008, http://www.ichit2008.org (PC Member).
  • The CYBERWORLDS International Conference 2008 (Cyberworlds 2008). Hangzhou, China, September 22-24, 2008. http://www.china-vr.com/cw08/ (Topic: Security) (PC Member).
  • The Third Annual Workshop on Digital Forensics and Incident Analysis (WDFIA 2008). Malaga, Spain, October 9, 2008. http://www.icsd.aegean.gr/wdfia08/ (PC Member).
  • The 5th International Workshop on Formal Aspects in Security&Trust (FAST2008). Malaga, Spain, October 9, 2008 (PC Member).
  • International Workshop on Security and Privacy in Wireless and Mobile Computing, Networking and Communications (SecPri_WiMob 2008). Avignon, France. October 12, 2008. http://www.aegean.gr/SecPri_WiMob_2008 (PC Member).
  • First International Symposium on Multimedia – Applications and Processing (MMAP'08). Wisla, Poland, October 20-22, 2008 http://www.imcsit.org/?cont=115&type=page&page=96 (PC Member).
  • 3rd International Workshop on Secure Information Systems (SIS'08). Wisla, Poland, October 20-22, 2008, http://www.imcsit.org/?cont=94&type=page&page=75 (PC Member).
  • The XI International Conference “Regional informatics-2008” (“RI-2008”), St. Petersburg, October 21-23, 2008. http://www.spiiras.nw.ru (PC Member).
  • The First International Conference on u- and e- Service, Science and Technology (UNESST2008). Hainan Island, China. December 13-15, 2008 http://www.sersc.org/UNESST2008/ (PC Member).

2007

  • The Third International Workshop "Information Fusion and Geographical Information Systems (IF&GIS'07)". St.Petersburg, Russia. May 27-29, 2007 (Topic: Information Assurance and Protection in GIS) (PC Member). http://www.oogis.ru/ru/Workshop_2007/workshop_2007.htm
  • The International Conference "Mathematical Methods, Models and Architectures for Computer Networks Security" (MMMACNS-07). St.Petersburg, Russia. September 16-18, 2007. http://www.comsec.spb.ru/mmm-acns07/ (PC Co-Chairman).
  • The IEEE Fourth International Workshop on "Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications" (DAACS'2007), Dortmund, Germany. September 6-8, 2007. http://www.idaacs.net (PC Member).
  • The CYBERWORLDS International Conference 2007 (Cyberworlds 2007). Hannover, Germany. October 24-26. 2007. (Topic: Security) http://www.gdv.uni-hannover.de/hcw07 (PC Member).
  • The 3rd Indian International Conference on Artificial Intelligence (IICAI-07). Pune (PooNay), India. December 17-19, 2007. http://www.iiconference.org (PC Member).
  • 2007 International Conference on Hybrid Information Technology (ICHIT'07). Fukuoka, Japan. November 9th-11th 2007 http://nms.dongguk.ac.kr/ichit2007/ (PC Member).
  • IV-th International Conference "Integrated models and soft computing in Artificial Intelligence". Kolomna, Russia. May 17-19, 2007. http://imscai.rk9.bmstu.ru (PC Member).
  • The Second International Conference on Bio-Inspired Computer Science and Applications (BIONETICS 2007) (Topic: Security from biology). Budapest, Hungary. December 10-12, 2007. http://www.bionetics.org/ (PC Member).
  • The 2nd Annual Workshop on Digital Forensics and Incident Analysis (WDFIA 2007). Samos, Greece, August 27-28, 2007. http://www.aegean.gr/wdfia07 (PC Member).
  • V St.Petersburg Interregional Conference “Information Security of Russian Regions (ISRR-2007)”. St.Petersburg, Russia. October 23-25, 2007. (PC Member).

2006

  • The 3rd International Workshop on Safety and Security in Multiagent Systems (SASEMAS '06). Hakodate, Japan. 8 May, 2006. http://sasemas.org/2006/ (PC Member).
  • The 4th International Workshop on Formal Aspects in Security&Trust (FAST2006). The 14th Formal Methods Symposium (FM'06). Hamilton, Ontario, Canada. August 26-27, 2006. http://www.iit.cnr.it/FAST2006/ (PC Member).
  • 2006 International Conference on Hybrid Information Technology (ICHIT 2006) (Topics: Multi-Scale Modeling and Simulation; Security and Safety Systems). Cheju Island, Korea. November 9-11, 2006. http://www.ichit2006.org/ (PC Member).
  • BIONETICS - International Conference on Bio-Inspired Computer Science and Applications (Topic: Security from biology). Madonna di Campiglio, Italy. December 11-13, 2006. http://www.bionetics.org/ (PC Member).

2001-2005

  • The Third International Workshop on Mathematical Methods, Models and Architectures for Computer Networks Security (MMMACNS-05), St. Petersburg, Russia. September 24-28, 2005 (PC Co-Chairman).
  • The Second International Workshop on Safety and Security in Multiagent Systems (SASEMAS '05). Utrecht, The Netherlands. July 26, 2005 (PC Member).
  • 3rd International Workshop on Formal Aspects in Security & Trust (FAST2005). Newcastle, UK. July 18-19, 2005 (PC Member).
  • IV Inter-regional Conference "Information Security of Russia Regions (ISRR-2005)". St.Petersburg, June 14-16, 2005 (PC Member).
  • The 2nd International Workshop on Security Issues with Petri Nets and other Computational Models (WISP'04). Bologna, Italy. June 26, 2004 (PC Member).
  • III Inter-regional Conference "Information Security of Russia Regions (ISRR-2003)". Saint-Petersburg. November 25-27, 2003 (PC Member).
  • China-Russia Bilateral Conference on Intelligent Information Processing (CRBCIIP-03). Shanghai, China. October 19-23, 2003 (PC Member).
  • The Second International Workshop on Mathematical Methods, Models and Architectures for Computer Network Security (MMMACNS-03), St. Petersburg, Russia. September 21-23, 2003 (PC Member).
  • China-Russia Bilateral Conference on Intelligent Information Processing (CRBCIIP-02). Beijing, China. December 5-10, 2002 (PC Member).
  • International Congress "Artificial Intelligence in XXI century" (ICAI'2001). Divnomorskoe, Russia. September 3-10, 2001 (PC Member).
  • The First International Workshop on Mathematical Methods, Models and Architectures for Computer Network Security (MMMACNS-01), St. Petersburg, Russia. May 21-23, 2001 (PC Member).
Participating in Editorial Board of the following scientific journals: Member of Dissertation Council of SPIIRAS

Top 

Membership in International Societies

Member of
  • Association for Computing Machinery (ACM),
  • IEEE and Computer Societies,
  • Institute for Systems and Technologies of Information, Control and Communication (INSTICC),
  • International Society of Information Fusion (ISIF),
  • Russian and European Associations of Artificial Intelligence (RAAI, EAAI),
  • International scientific, engineering and educational organization dedicated to advancing the arts, sciences and applications of Information Technology and Microelectronics (Euromicro).

Top 

Awards

2013

  • Kotenko Igor Vitalievich - Igor Kotenko and Elena Doynikova are a laureates of the best paper award on the IEEE 7th International Conference on “Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications” (IDAACS'2013). Berlin, Germany, September 12-14, 2013.

2012

  • Kotenko Igor Vitalievich - a laureate of the St. Petersburg Government award (A.S. Popov) for outstanding scientific achievements in the field of science and technology in 2012 (in the “electrical and radio engineering, electronics and information technology”).

2011

  • Kotenko Igor Vitalievich - The paper "Verification of Security Policy Filtering Rules by Model Checking" of Igor Kotenko and Olga Polubelova got the best paper prize of the conference IDAACS 2011.

2008

  • Kotenko Igor Vitalievich - The 2008 Grant on the program “Prominent scientists of Russian Academy of Sciences. Doctors of national science” of Russian science support fund.

2007

  • Kotenko Igor Vitalievich - The 2007 Grant on the program “Prominent scientists of Russian Academy of Sciences. Doctors of national science” of Russian science support fund.

2006

  • Kotenko Igor Vitalievich - Diploma for Best Work in the area of artificial intelligence for 2004-2006 in the nomination of "Applied Research" (Russian Association of Artificial Intelligence (RAAI)).

  • Kotenko Igor Vitalievich - Best student authored paper - Kotenko I., Ulanov A. Simulation of Internet DDoS Attacks and Defense. 9th Information Security Conference. ISC 2006. Samos, Greece. August 30 - September 2, 2006. Proceedings. Lecture Notes in Computer Science, Vol. 4176, 2006. P.327-342.

Top 

Patents and Programms

Programs and databases

2014

  1. Igor Kotenko, Elena Doynikova, Andrey Chechulin. Calculation of the security metrics for the monitoring of the current security state of information and telecommunication systems for the deńision support of the responses on the security incidents. Federal Service for Intellectual Property. Certificate No 2014661026. Registered in the Computer Program Registry 22.10.2014.

  2. Igor Kotenko, Andrey Chechulin. Malefactor model formation for security evaluation of information and telecommunication systems. Federal Service for Intellectual Property. Certificate No 2014661028. Registered in the Computer Program Registry 22.10.2014.

  3. Vasily Desnitsky, Igor Kotenko. Verificataion of network information flows for protection of information and telecommunication systems with embedded devices. Federal Service for Intellectual Property. Certificate No 2014661027. Registered in the Computer Program Registry 22.10.2014.

2013

  1. Igor Kotenko, Vasily Desnitsky. Configurator of protection system of embedded devices. Federal Service for Intellectual Property. Certificate No 2013612691. Registered in the Computer Program Registry 11.03.2013 ć.
  2. Olga Polubelova, Igor Kotenko. Verifier of filtering rules of security policy. Federal Service for Intellectual Property. Certificate No 2013612707. Registered in the Computer Program Registry 11.03.2013 ć.
  3. Igor Kotenko, Andrey Shorov. Simulator of botnets and defense mechanisms against them. Federal Service for Intellectual Property. Certificate No 2013612788. Registered in the Computer Program Registry 13.03.2013.
  4. Evgenia Novikova, Igor Kotenko. System for visualization of logs of mobile money transfer service. Federal Service for Intellectual Property. Certificate No 2013660999. Registered in the Computer Program Registry 26.11.2013 ć.

2012

  1. Igor Kotenko, Andrey Chechulin, Mikhail Stepashkin. Designer of specifications of computer networks. Certificate No.2012615244. Registered in the Computer Program Registry 9.07.2012.

  2. Igor Kotenko, Andrey Chechulin, Mikhail Stepashkin. System of security analysis of computer networks. Certificate No.2012615245. Registered in the Computer Program Registry 9.07.2012.

  3. Igor Kotenko, Andrey Chechulin, Mikhail Stepashkin. Update of vulnerability database. Certificate No.2012615247. Registered in the Computer Program Registry 9.07.2012.

Top 

Projects

Current Grants and Projects

  • ENGENSEC
    Igor Kotenko (Principal Investigator from SPIIRAS). “Educating the Next generation experts in Cyber Security: the new EU-recognized Master’s program”. Research Project of the European Community program TEMPUS ¹ 544455-TEMPUS-1-2013-1-SE-TEMPUS-JPCR (http://engensec.eu/), 2014-2016 (Principal Investigator).
  • Igor Kotenko (Principal Investigator) – State Contract No. 14.604.21.0137 "Development of the technologies of the interactive visualization of the unformalized heterogeneous data for decision support systems in scope of the information security monitoring and management in the information and telecommunication systems". Project of Russian Ministry of Education and Science in scope of the Program "Research and development in priority directions of evolution of the scientific and technological complex of Russia on 2014-2020", 2014-2016., 2014-2016 (Principal Investigator).
  • Igor Kotenko (Principal Investigator) – State Contract No. 14.604.21.0147 "Development of the methods for aggregation, normalization, analysis and visualization of big arrays of the heterogeneous, structured, semi-structured and unstructured data for the security monitoring and management of the distributed network of the electronic consumer devices". Project of Russian Ministry of Education and Science in scope of the Program "Research and development in priority directions of evolution of the scientific and technological complex of Russia on 2014-2020", 2014-2016., 2014-2016 (Principal Investigator).
  • Igor Kotenko (Principal Investigator). State Contract No. 14.604.21.0033 “Models, methods and software for development and analysis of information-telecommunication system security components for Internet of Things concept”. Project of Russian Ministry of Education and Science, 2014-2015 (Principal Investigator).
  • Igor Kotenko (Principal Investigator) – State Contract No. 14.616.21.0028 "Perspective methods of correlation of the security information and incidents management information in the critical infrastructures on the base of the convergence of the technologies of the security awareness on the physical and logical levels". Project of Russian Ministry of Education and Science in scope of the Program "Research and development in priority directions of evolution of the scientific and technological complex of Russia on 2014-2020", 2014., 2014-2014 (Principal Investigator).
  • Igor Kotenko (Principal Investigator). “Mathematical models and methods for monitoring and management of information security in computer networks and systems of critical infrastructures based on intelligent services of information protection”. Research grant # 13-01-00843-a of Russian Foundation of Basic Research, 2013-2015 (Principal Investigator).
    Report-2013-13-01-00843-a-short [application/pdf] (294747 bytes)
  • Igor Kotenko (Principal Investigator). “Methods for the synthesis of the distributed intelligent system of information and technological security of automated control systems for railways”. Research grant # 13-07-13159-ofi_m_RJD of Russian Foundation of Basic Research, 2013-2014 (Principal Investigator).
  • Igor Kotenko (Principal Investigator). “Mathematical models, methods and algorithms of attack modeling, computer systems and networks protection analysis, information security risk analysis and decision-making for selection of security mechanisms in computer systems and networks”. Program "Architectural and software solutions, and security of data-processing supercomputer complexes of new generations" of the Russian Academy of Sciences Branch "Nanotechnologies and Information Technologies", 2012-2014 (Principal Investigator).

Former Projects

  • Igor Kotenko (Principal Investigator). Project in agreement with F-Secure corporation, 2012-2013 (Principal Investigator).
  • Igor Kotenko (Principal Investigator). State Contract No. 11.519.11.4008 “Research and development of methods, models and algorithms of intellectualizing the secirity services in critical infrastructures”. Project of Russian Ministry of Education and Science, 2011-2013 (Principal Investigator).
  • Igor Kotenko (Principal Investigator). “Mathematical models and methods of integrated protection against network attacks and malware in computer networks and systems based on hybrid multi-agent modeling and simulation of computer counteraction, verified adaptive security policies and proactive monitoring by data mining”. Research grant # 10-01-00826-a of Russian Foundation of Basic Research, 2010-2013 (Principal Investigator).
    Report-2010-10-01-00826-a-short.pdf [application/pdf] (191714 bytes)
    Report-2011-10-01-00826-a-short.pdf [application/pdf] (260794 bytes)
    Report-2012-10-01-00826-a-short.pdf [application/pdf] (348160 bytes)
  • Igor Kotenko (Principal Investigator from SPIIRAS). “Design of Secure and energy-efficient embedded systems for Future internet applications (SecFutur)”. Research Project of the European Community seventh framework program (FP7). Contract No. 256668 (http://www.secfutur.eu/), 2010-2013 (Principal Investigator).
  • Igor Kotenko (Principal Investigator from SPIIRAS). “MAnagement of Security information and events in Service InFrastructures (MASSIF)”. Research Project of the European Community seventh framework program (FP7). Contract No. 257475 (http://www.massif-project.eu/), 2010-2013 (Principal Investigator).
  • Igor Kotenko (Principal Investigator). Project in agreement with F-Secure corporation, 2010-2011 (Principal Investigator).
  • Igor Kotenko (Principal Investigator). “Mathematical Models, Methods and Algorithms of Proactive Protection against Malware in Computer Networks and Systems”. Program "Architecture, system solutions, software, standardization and information security of computer complexes of new generations" of the Russian Academy of Sciences Branch "Nanotechnologies and Information Technologies", 2009-2011 (Principal Investigator).
  • Igor Kotenko (Principal Investigator). Project in agreement with F-Secure corporation, 2009-2009 (Principal Investigator).
  • Igor Kotenko (Principal Investigator). Project on demand of Section of Applied Problems of Russian Academy of Sciences. Governmental contract, 2008-2009 (Principal Investigator).
  • Igor Kotenko (Principal Investigator“Models and methods of construction and functioning support of intelligent adaptive security systems based on modeling and simulation of security systems behavior, realization of verified security policies, security evaluation and proactive monitoring”. Research grant # 07-01-00547 of Russian Foundation of Basic Research, 2007-2009 (Principal Investigator).
    Report-07-01-00547a-2007short.pdf [application/pdf] (193198 bytes)
    Report-07-01-00547a-2008short.pdf [application/pdf] (205945 bytes)
    Report-07-01-00547a-2009short.pdf [application/pdf] (943498 bytes)
  • Igor Kotenko (Principal Investigator from SPIIRAS). “Remote EnTrusting by RUn-time Software authentication (RE-TRUST)”. Research Project of the European Community sixth framework program, 2006-2009 (Principal Investigator from SPIIRAS).
  • Igor Kotenko (Principal Investigator). “Automatic Detection and Response Techniques against Internet Worms”. The subcontract with International Research Institute for Advanced Systems (IRIAS) according to contract with Hewlett-Packard, 2006-2007 (Principal Investigator).
  • Igor Kotenko (Principal Investigator). “Development of scientific-methodical bases of information protection in the communication channels of International collective ecological safety system”. The state contract with the Center of security problems research of the Russian Academy of Sciences, 2006-2006 (Principal Investigator).
  • Oleg Karsaev (Principal Investigator from SPIIRAS). “MIND - Machine Learning for Intrusion Detection”. Institute Fraunhofer First, Berlin, Germany, 2004-2006 (Researcher).
  • Igor Kotenko (Principal Investigator). “Modeling of information security processes in computer networks in adversarial environment: formal framework, mathematical models, multi-agent architecture, software prototype and experimental evaluation”. Research grant 04-01-00167 of Russian Foundation of Basic Research, 2004-2006 (Principal Investigator).
    Report-04-01-00167a-2006.pdf [application/pdf] (446259 bytes)
    Report-04-01-00167a.pdf [application/pdf] (510438 bytes)
  • Igor Kotenko (Principal Investigator). “Network traffic preprocessing algorithms”. INTEL, 2004-2005 (Principal Investigator).
  • Igor Kotenko (Principal Investigator). “Monitoring of user activity in computer networks”. Contract for Centre of Information Technologies and Systems of Executive State Authorities, Russia, 2004-2004 (Principal Investigator).
  • Igor Kotenko (Principal Investigator). “Mathematical Models of Active Analysis of Vulnerabilities, Intrusion Detection and Network Attacks Counteraction in Computer Networks based on Multi-agent Technologies”. Program "Optimization of computer architectures to particular classes of tasks, information assurance of network technologies" of the Russian Academy of Sciences Branch "Nanotechnologies and Information Technologies"., 2003-2008 (Principal Investigator).
  • Igor Kotenko (Principal Investigator from SPIIRAS). “Policy-based Security Tools and Framework (POSITIF)”. Research Project of the European Community sixth framework program. Contract # IST-2002-002314, 2003-2007 (Principal Investigator from SPIIRAS).
  • Igor Kotenko (Principal Investigator). “Software Prototype of Deception System”. Contract # 1/0308-ź for Centre of Information Technologies and Systems of Executive State Authorities, Russia, 2003-2004 (Principal Investigator).
  • Igor Kotenko (Principal Investigator). “Mathematical Foundations, Architecture and Principles of Implementation of Multi-Agent Learning Components for Attack Detection Computer Networks”. Contract for European Office of Aerospace Research and Development, ISTC, 2001-2003 (Principal Investigator).
    1994-2001-Task2-en.pdf [application/pdf] (151228 bytes)
    1994-2001-Task2-ru.pdf [application/pdf] (225220 bytes)
    1994-2002-Task2-en.pdf [application/pdf] (206860 bytes)
    1994-2002-Task2-ru.pdf [application/pdf] (315097 bytes)
    1994-2003-Task2-en.pdf [application/pdf] (135652 bytes)
    1994-2003-Task2-ru.pdf [application/pdf] (384850 bytes)
  • Igor Kotenko (Principal Investigator). “Formal Grammar-Based Approach and Tool for Simulation Attacks against Computer Network”. Contract for European Office of Aerospace Research and Development, ISTC, 2001-2003 (Principal Investigator).
    1994-2001-Task1-en.pdf [application/pdf] (159554 bytes)
    1994-2001-Task1-ru.pdf [application/pdf] (211870 bytes)
    1994-2002-Task1-en.pdf [application/pdf] (207362 bytes)
    1994-2002-Task1-ru.pdf [application/pdf] (294571 bytes)
    1994-2003-Task1-en.pdf [application/pdf] (68592 bytes)
    1994-2003-Task1-ru.pdf [application/pdf] (300009 bytes)
  • Igor Kotenko (Principal Investigator). “Mathematical Models of Information Security Assurance in Computer Networks based on Multi-agent Technologies and their Experimental Evaluation”. Research grant 01-01-00108 of Russian Foundation of Basic Research, 2001-2003 (Principal Investigator).
    RFBR-2003-FORM501-ru.pdf [application/pdf] (60135 bytes)
    RFBR-2003-FORM502-en.pdf [application/pdf] (7885 bytes)
  • Vladimir Gorodetski (Principal Investigator). “Agent-Based Model of Information Security System: Architecture and Formal Framework for Coordinated Intelligent Agents Behavior Specification”. Contract for European Office of Aerospace Research and Development, ISTC, 1999-2001 (Researcher).

Top 

Main publications

Books and Chapters in Books

  1. Igor Kotenko, Alexey Konovalov, Andrey Shorov. Discrete-Event Simulation of Botnet Protection Mechanisms. Discrete Event Simulations - Development and Applications. Edited by Eldin Wee Chuan Lim. Rijeka, Croatia: InTech. 2012 P.143-168.
  2. Igor Kotenko, Rafal Leszczyna. Software agents for network security. NATO Science for Peace and Security Series, Software Agents, Agent Systems and Their Applications, Volume 32, 2012. Edited by M.Essaaidi, M.Ganzha, and M.Paprzycki. Amsterdam, Netherlands: IOS Press. IOS Press. 2012. P. 260-285.
  3. Leszczyna R., Kotenko I. Security and anonymity of agent systems // NATO Science for Peace and Security Series, Software Agents, Agent Systems and Their Applications, Volume 32, 2012. Edited by M.Essaaidi, M.Ganzha, and M.Paprzycki. Amsterdam, Netherlands: IOS Press. IOS Press. 2012. P. 157-177.
  4. I.Kotenko. Agent-Based Modelling and Simulation of Network Cyber-Attacks and Cooperative Defence Mechanisms. Discrete Event Simulations. Sciyo, In-teh. 2010. P.223-246. ISBN 978-307-115-2.
  5. I.V.Kotenko, A.V.Bogovik, Kovalev I.S., etc. The control theory in military systems. I.V.Kotenko (ed.). Moscow, MD, 2001. 312 p. (in Russian).
  6. I.V.Kotenko, M.M.Kotuchov, A.S.Markov, etc. Legal, organizational and technical support of information security of the automation systems and telecommunication networks. I.V.Kotenko (ed.). SPb., MSU, 2000. 190 p. (in Russian).
  7. I.V.Kotenko, A.V.Bogovik, Kovalev I.S., etc. Foundations of the control theory in military systems. Part 2. A.Y. Runeev and I.V.Kotenko (ed.). SPb., MSU, 2000. 200 p. (in Russian).
  8. I.V.Kotenko, A.V.Bogovik, Kovalev I.S., etc. Foundations of the control theory in military systems. Part 1. A.Y. Runeev and I.V.Kotenko (ed.). SPb., MSU, 2000. 192 p. (in Russian).
  9. I.V.Kotenko. The theory and practice of construction of the systems of information and computing support of communication planning processes on the basis of new information technologies. SPb., MSA, 1998. 404 p. (in Russian).
  10. I.V.Kotenko, G.A.Rybov, I.B.Saenko. Intelligent systems for telecommunication control. N.I.Burenin (ed.). SPb., MSA, 1996. 150 p. (in Russian).
  11. I.V.Kotenko, I.P.Janchenko, A.V.Bogovik. Automation of the telecommunication documents development. A.Y. Runeev (ed.). SPb., MSA, 1995. 150 p. (in Russian).
  12. I.V.Kotenko. Object-oriented programming: Smalltalk/V and Smalltalk/V 286. Application for automation of telecommunication control processes. SPb., MSA, 1995. 294 p. (in Russian).
  13. I.V.Kotenko. Logic programming in Prolog. TURBO and PDC PROLOG. SPb., MSA, 1994. 412 p. (in Russian).
  14. I.V.Kotenko. Methods of reasoning in expert systems under the incomplete and contradictory information. SPb., MSA, 1992. 77 p. (in Russian).
  15. I.V.Kotenko. Diagnostics of telecommunication networks. SPb., MSA, 1992. 219 p. (in Russian).
  16. V.I.Antuhov, I.V.Kotenko. Knowledge bases. SPb., MSA, 1991. 86 p. (in Russian).

Papers

2014

  1. Igor Kotenko, Andrey Shorov, Andrey Chechulin, Evgenia Novikova. Dynamical Attack Simulation for Security Information and Event Management. V. Popovich et al. (eds.), Information Fusion and Geographic Information Systems (IF&GIS 2013), Lecture Notes in Geoinformation and Cartography, DOI: 10.1007/978-3-642-31833-7_14, Springer-Verlag, Berlin, Heidelberg, 2014. P.219-234.
  2. Igor Kotenko, Olga Polubelova, Igor Saenko. Logical Inference Framework for Security Management in Geographical Information Systems. V. Popovich et al. (eds.), Information Fusion and Geographic Information Systems (IF&GIS 2013), Lecture Notes in Geoinformation and Cartography, DOI: 10.1007/978-3-642-31833-7_14, Springer-Verlag, Berlin, Heidelberg, 2014. P.203-218.
  3. Igor Kotenko, Elena Doynikova and Andrey Chechulin. Security metrics based on attack graphs for the Olympic Games scenario. 22th Euromicro International Conference on Parallel, Distributed, and Network-Based Processing (PDP 2014). Torino, Italy, February, 2014. 1066-6192/14 © 2014 IEEE DOI 10.1109/PDP.2014.113 IEEE Computer Society. 2014. P. 561-568. (Scopus)
  4. Igor Kotenko, Igor Saenko, Andrey Chechulin. Proactive management of security information and events in the information and telecommunication systems. Questions of Radioelectronics. Issue 1 (3). Moscow, ZNII "Elektronika", 2014. P. 170-180. ISSN: 0233-9950 (in Russian).
  5. Andrey Fedorchenko, Andrey Chechulin, Igor Kotenko. Analytical review of open vulnerability databases. 16th Conference “RusCrypto” on Cryptology, Steganography, Digital Signature and Security Systems. Solnechnogorsk, Russia. March 25-28, 2014. http://www.ruscrypto.ru/ (in Russian).
  6. Andrey Chechulin, Igor Kotenko. Security event handling in real time mode using an approach based on the attack trees analysis. 16th Conference “RusCrypto” on Cryptology, Steganography, Digital Signature and Security Systems. Solnechnogorsk, Russia. March 25-28, 2014. http://www.ruscrypto.ru/ (in Russian).
  7. Igor Kotenko, Andrey Chechulin, Andrey Shorov, Dmitry Komashinsky. Analysis and Evaluation of Web Pages Classification Techniques for Inappropriate Content Blocking. P. Perner (Ed.): 14th Industrial Conference on Data Mining (ICDM 2014), Lecture Notes in Artificial Intelligence (LNAI 8557), DOI 10.1007/978-3-319-08976-8. P. 39–54. ISSN 0302-9743, ISBN 978-3-319-08975-1. (Scopus)
  8. Andrey Chechulin, Igor Kotenko. Application of Big Data processing methods for computer network infrastructure security. Conference on Information Technologies in Control (ITC) held in conjunction with 5-th Russian Multiconference on Problems in Control (MPC). Proceedings. St.Petersburg, Russia. October 9–11, 2012. P.614-617. (in Russian).
  9. Andrey Fedorchenko, Andrey Chechulin, Igor Kotenko. Integrated vulnerabilities database for computer networks security evalution systems. Conference on Information Technologies in Control (ITC) held in conjunction with 7-th Russian Multiconference on Problems in Control (MPC). Proceedings. St.Petersburg, Russia. October 7–9, 2014. P.638-641. (in Russian).
  10. Andrey Chechulin, Igor Kotenko. Design of the system for users protection against inappropriate content in the Internet. Conference on Information Technologies in Control (ITC) held in conjunction with 7-th Russian Multiconference on Problems in Control (MPC). Proceedings. St.Petersburg, Russia. October 7–9, 2014. P.642-647. (in Russian).
  11. Andrey Chechulin, Igor Kotenko, Vasily Desnitsky.Features of the information security systems design in cyber-physical systems. ÕXIII All-Russian Conference “Methods and technical tools of information security” (MTTIS 2014)”. Proceedings. St.Petersburg, Russia. 30 June - 03 July, 2014. P.67-69. (in Russian).
  12. Andrey Fedorchenko, Andrey Chechulin, Igor Kotenko. Investigation of open vulnerability databases and their applicability evaluation for computer networks security evaluation systems. Management-information systems, 2014, No 5, P.72-79. ISSN 1684-8853. (in Russian).
  13. Andrey Chechulin, Igor Kotenko. Software prototype of analytical attacks modeling component for security information and events management systems. XIV Saint-Petersburg International Conference “Regional informatics-2014” (“RI-2014”). Proceedings. St. Petersburg, 2014. pp. 170-171. (in Russian).
  14. Andrey Chechulin, Igor Kotenko. Attack Graph Construction for Security Events Analysis. Security of Information Technologies, No. 3, 2014, P.135-141. (in Russian).
  15. Andrey Chechulin, Igor Kotenko. Real-time security events processing using an approach based on the attack trees analysis . Problems of information security. Computer systems. ¹ 3, 2014. P.56-59. (in Russian).
  16. Andrey Fedorchenko, Andrey Chechulin, Igor Kotenko. Analytical overview of open vulnerabilities databases. Problems of information security. Computer systems. ¹ 3, 2014. P.131-135. (in Russian).
  17. Andrey Fedorchenko, Andrey Chechulin, Igor Kotenko. Construction of the integrated vulnerability database. Proceedings of the universities. Instrument making. Vol.57, ¹ 11, 2014. P.62-67. ISSN 0021-3454. (in Russian).
  18. Philipp Nesteruk, Lesya Nesteruk, Igor Kotenko. Creation of a Fuzzy Knowledge Base for Adaptive Security Systems // Proceedings of the 22th Euromicro International Conference on Parallel, Distributed and network-based Processing (PDP 2014). Turin, Italy. 12th - 14th February, 2014. Los Alamitos, California. IEEE Computer Society. 2014. P.574-577. (WoS, Scopus)
  19. Igor Kotenko, Elena Doynikova. Security Assessment of Computer Networks based on Attack Graphs and Security Events // The 2014 Asian Conference on Availability, Reliability and Security (AsiaARES 2014). In conjunction with ICT-EurAsia 2014. Bali, Indonesia, April 14th – 17th, 2014. / Linawati et al. (Eds.): ICT-EurAsia 2014, Lecture Notes in Computer Science (LNCS), Vol.8407. IFIP International Federation for Information Processing (2014). Springer. 2014, P.462-471. (WoS, Scopus)
  20. Kotenko I., Shorov A. Simulation of bio-inspired security mechanisms against network infrastructure attacks // Intelligent Distributed Computing VIII. Studies in Computational Intelligence. Springer-Verlag, Vol.570. Proceedings of 8th International Symposium on Intelligent Distributed Computing - IDC'2014. September 3-5, 2014, Madrid, Spain. Springer-Verlag. P.127-133. (WoS, Scopus)
  21. Igor Kotenko, Igor Saenko. Design of Virtual Computer Networks: Data Mining by Genetic Algorithms // Intelligent Distributed Computing VIII. Studies in Computational Intelligence. Springer-Verlag, Vol.570. Proceedings of 8th International Symposium on Intelligent Distributed Computing - IDC'2014. September 3-5, 2014, Madrid, Spain. Springer-Verlag. P.95-105. (WoS, Scopus)
  22. Igor Kotenko, Elena Doynikova. Security Evaluation Models for Cyber Situational Awareness // The 2014 IEEE 6th International Symposium on Cyberspace Safety and Security (CSS 2014). August 20-22, 2014, Paris, France. 2014. Los Alamitos, California. IEEE Computer Society. 2014. P.1229-1236. (WoS, Scopus)
  23. Igor Kotenko, Evgenia Novikova. Visualization of Security Metrics for Cyber Situation Awareness // The 1st International Software Assurance Workshop (SAW 2014). In conjunction with the 9th International Conference on Availability, Reliability and Security (ARES 2014). September 8nd – 12th, 2014. Fribourg, Switzerland. IEEE Computer Society. 2014. P.506-513. (WoS, Scopus)
  24. Evgenia Novikova, Igor Kotenko. Visual Analytics for Detecting Anomalous Activity in Mobile Money Transfer Services // International Cross Domain Conference and Workshops (CD-ARES 2014). September 8nd – 12th, 2014. Fribourg, Switzerland. Lecture Notes in Computer Science (LNCS), Vol.8708. Springer-Verlag. 2014, P.63-78. (WoS, Scopus)
  25. Vasily Desnitsky, Igor Kotenko. Expert Knowledge based Design and Verification of Secure Systems with Embedded Devices // 4rd IFIP International Workshop on Security and Cognitive Informatics for Homeland Defense (SeCIHD 2014). September 8nd – 12th, 2014. Fribourg, Switzerland. Lecture Notes in Computer Science (LNCS), Vol.8708. Springer-Verlag. 2014. P.194-210. (WoS, Scopus)
  26. Igor Kotenko, Elena Doynikova. Evaluation of Computer Network Security based on Attack Graphs and Security Event Processing // Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), Vol.5, No.3, September 2014. P.14-29. (Scopus)
  27. Igor Saenko, Igor Kotenko. Design of Virtual Local Area Network Scheme based on Genetic Optimization and Visual Analysis // Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), Vol.5, No.4, December 2014. (Scopus)
  28. Andrey Shorov, Igor Kotenko. The Framework for Simulation of Bio-inspired Security Mechanisms Against Network Infrastructure Attacks // The Scientific World Journal, Volume 2014 (2014), Article ID 172583, 11 pages. http://dx.doi.org/10.1155/2014/172583. (WoS, IF=1.730, Scopus)
  29. Igor Kotenko, Igor Saenko. Creating New Generation Cybersecurity Monitoring and Management Systems // Herald of the Russian Academy of Sciences, 2014, Vol.84, No.6. ISSN 1019-3316. DOI: 10.1134/S1019331614060033 (Scopus IF=0.170, WoS)
  30. Igor Kotenko, Igor Saenko. The proposals about ontological representation and hybrid data storage for security events in the automated control system of railway transport // Technical science - from theory to practice, ¹ 29, 2013. Novosibirsk, SibAK, 2013. P.28-32. (in Russian).
  31. Igor Kotenko, Igor Saenko. Proposals on the logical inference implementation for cyber security management in the automated control system of railway transport // Natural and mathematical science in the modern world. 2014, ¹ 14. Novosibirsk, SibAK, P.46-50. (in Russian).
  32. Igor Kotenko, Igor Saenko. The technique for verification of security policies in the multilevel intelligent system of integrated protection of railway transport // Technical science - from theory to practice. Novosibirsk, SibAK, 2014. ¹ 30. P.18-22. (in Russian).
  33. Igor Kotenko, Elena Doynikova. Calculation and analysis of the security metrics on the base of the attack graphs and service dependencies // . Problems of information security. Computer systems, ¹ 2, 2014. P.19-36. (in Russian).
  34. Vasily Desnitsky, Igor Kotenko. Design and verification of secure systems with embedded devices on the base of expert knowledge Problems of information security. Computer systems. ¹ 3, 2014. P.16-22. (in Russian).
  35. Igor Kotenko and Igor Saenko. Creating New-Generation Cybersecurity Monitoring and Management Systems // Herald of the Russian Academy of Sciences, Vol. 84, No. 11, 2014, P.993–1001 (in Russian).
  36. Igor Kotenko, Igor Saenko, Rafael Yusupov. New generation of the security incidents’ monitoring and management systems // Nauchno-tekhnicheskie vedomosti SPbGPU. Informatics. Telecommunications. Control. SPbGPU, 2014, No. 3 (198), P.7-18. (in Russian).
  37. Igor Kotenko, Elena Doynikova.. Monitoring of the current security situation and security decisions support in the computer network on the base of the system of the security metrics // Proceedings of the universities. Instrument making. Ņ.57, ¹ 10, 2014, P.72-77. ISSN 0021-3454. (in Russian).
  38. Vasily Desnitsky, Igor Kotenko. The use of expert knowledge in development of secure systems with embedded devices. Information Technologies and Computing Systems, ¹ 4, 2014, P.17-32. (in Russian).
  39. Igor Kotenko, Igor Saenko. About the tasks of cybersecurity in ‘e-city’ infrastructures on the basis of artificial intelligence methods. Conference on Information Technologies in Control (ITC) held in conjunction with 7-th Russian Multiconference on Problems in Control (MPC). Proceedings. St.Petersburg, Russia. October 7–9, 2014. P.618-622. ISBN 978-5-91995-042-4. (in Russian).
  40. Igor Kotenko, Andrey Chechulin. Fast Network Attack Modeling and Security Evaluation based on Attack Graphs // Journal of Cyber Security and Mobility, Vol.3, No.1, P.27–46.
  41. Igor Kotenko, Evgenia Novikova. The models and techniques of a visual data analysis for task solution of the cyber security // 16th Conference “RusCrypto” on Cryptology, Steganography, Digital Signature and Security Systems. Solnechnogorsk, Russia. March 25-28, 2014. http://www.ruscrypto.ru/ (in Russian).
  42. Igor Kotenko, Igor Saenko. On the construction of an multilevel intelligent information security system for the automated systems of railway transport. Intelligent systems on the transport. Proceedings of the IV International scientific-practical Conference «IntellectTrans-2014». St. Petersburg, Petersburg State Communications’ University. 2014. P.21. (in Russian).
  43. Igor Kotenko, Igor Saenko. On the construction of a multilevel intelligent information security system for the automated systems of railway transport. Intelligent systems on the transport. Materials of the International scientific-practical Conference «IntellectTrans-2014». St. Petersburg, Petersburg State Communications’ University. 2014. P.196-203. (in Russian).
  44. Igor Kotenko, Rafael Yusupov. Cybersecurity monitoring and management systems of a new generation for information security in critical infrastructures. XVII All-Russian scientific-practical Conference "Actual security and protection problems". Saint-Petersburg, April 1–4, 2014. (in Russian).
  45. Igor Kotenko, Evgenia Novikova. Visual analytics guard of the information security. International Forum on practical security Positive Hack Days. Moscow. May 21-22, 2014. http://www.phdays.ru (in Russian).
  46. Igor Saenko, Igor Kotenko Fundamentals of the construction of the perspective security monitoring and management systems for a protection of the critical information objects. International scientific-practical conference "Theoretical and practical information security problems". June 19, 2014. Minsk, Academy of the Ministry of Internal Affairs, Belarus Republic, 2014. (in Russian).
  47. Andrey Fedorchenko, Andrey Chechulin, Igor Kotenko. The integrated database of vulnerabilities. International Scientific and Practical Conference "Theoretical and applied problems of information security." June 19, 2014, Minsk, Academy of MIA Republic of Belarus, 2014. (in Russian).
  48. Igor Kotenko, Igor Saenko. About an architecture of the multilevel intelligent information security system for the automated systems of railway transport. Information security methods and technical tools. ÕXIII All-Russian Conference “Methods and technical tools of information security” (MTTIS 2014)”. Proceedings. St.Petersburg, Russia. 30 June - 3 July, 2014. P.97-98. (in Russian).
  49. Vasily Desnitsky, Igor Kotenko. Configuring information systems with embedded devices to provide complex security on railway transport. ÕXIII All-Russian Conference “Methods and technical tools of information security” (MTTIS 2014)”. Proceedings. St.Petersburg, Russia. 30 June - 03 July, 2014. P.89-90. (in Russian).
  50. Vasily Desnitsky, Igor Kotenko. Combined protection model of information and telecommunication systems of Internet of Things concept. ÕXIII All-Russian Conference “Methods and technical tools of information security” (MTTIS 2014)”. Proceedings. St.Petersburg, Russia. 30 June - 03 July, 2014. P.65-66. (in Russian).
  51. Igor Kotenko, Igor Saenko. A system of logical inference and verification of security policies in automated systems of railway transport. Proceedings of the International congress IS&IT - International Conference on Artificial Intelligence and Systems. Moskow, Fizmathlit. 2014. Vol.2. P.271-276. 978-5-9221-1572-8. (in Russian).
  52. Igor Saenko, Igor Kotenko. Genetic approach to virtual network design. Proceedings of the International congress IS&IT - International Conference on Artificial Intelligence and Systems. Moskow, Fizmathlit 2014. Vol.1. P.35-40. ISBN 978-5-9221-1572-8. (in Russian).
  53. Igor Kotenko, Igor Saenko. Intelligent system for cyber security monitoring and incident management. Proceedings of the 14-th national conference on artificial intelligence with international participation (KAI-2014), September 24–27, 2014, Kazan, Russia. Vol.3. Kazan: Publ. RIC «Scool», 2014. P.219-227. (in Russian).
  54. Elena Doynikova., Igor Kotenko. Analysis and application of the security metrics in the SIEM-systems on the base of the attack graphs and service dependencies // The VIII St.Petersburg Interregional Conference «Information Security of Russian Regions (ISRR-2013). October 23-25, 2013. Proceedings. St.Petersburg, 2014. (in Russian).
  55. Vasily Desnitsky, Igor Kotenko. Conceptual combined model of embedded device protection system and its application to configuring components of multi-level intellectual system of complex security on railway transport. XIV Saint-Petersburg International Conference “Regional informatics-2014” (“RI-2014”). Proceedings. St. Petersburg, 2014. P.131. (in Russian).
  56. Elena Doynikova, Igor Kotenko. Security assessment in the RR automated management systems // XIV Saint-Petersburg International Conference “Regional informatics-2014” (“RI-2014”). Proceedings. St. Petersburg, 2014 . P.132-133. (in Russian).
  57. Igor Kotenko, Igor Saenko. Decision support on information security in the automated control systems of railway transport on the basis of the ontology data modelling. XIV Saint-Petersburg International Conference “Regional informatics-2014” (“RI-2014”). Proceedings. St. Petersburg, 2014. P.144. (in Russian).
  58. Igor Kotenko, Igor Saenko. Models and methods for a visual analysis of Big Data and security events in the automated control systems of railway transport. XIV Saint-Petersburg International Conference “Regional informatics-2014” (“RI-2014”). Proceedings. St. Petersburg, 2014. P.143. (in Russian).
  59. Igor Kotenko, Igor Saenko, Andrey Chechulin. Proactive management of information and security events in network NGN. Proceedings of the seminar of the International Telecommunication Union "Transition developing countries with existing networks to next generation network (NGN): technical, economic, legal and political aspects", St. Petersburg, St. Petersburg GUT Bonch-Bruyevich. 23-25 June 2014. (in Russian).

2013

  1. Alexey Konovalov, Igor Kotenko, Andrey Shorov. Simulation-based study of botnets and defense mechanisms against them. Journal of Computer and Systems Sciences International, ¹ 1, 2013, Ń.45-68. ISSN 0002-3388. (in Russian).
  2. Olga Polubelova, Igor Kotenko. Design of ontologies for vulnerabilities and logical inference application for security information and event management. Security of Information Technologies, No. 1, 2013, P. 21-24 (in Russian).
  3. Igor Kotenko, Igor Saenko. Architecture of the intelligent services system for information protection in critical infrastructures. Proceedings of SPIIRAS. Issue 1 (24). SPb: Nauka, 2013. P. 21-40 (in Russian).
  4. Igor Kotenko, Igor Saenko. Scientific Analysis and Policy Support for Cyber Security: review of perspective studies on the results of the International Worksop SA&PS4CS 2012. Proceedings of SPIIRAS. Issue 1 (24). SPb: Nauka, 2013. P. 66-88. (in Russian).
  5. Igor Kotenko, Igor Saenko, Olga Polubelova. Perspective storage systems for information security monitoring and management. Proceedings of SPIIRAS. Issue. 2 (25). SPb: Nauka, 2013. P. 113-134. (in Russian).
  6. Igor Kotenko, Igor Saenko. Mathematical Methods, Models and Architectures for Computer Networks Security: a review of perspective studies on the results of the International Conference of MMM-ACNS-2012. Proceedings of SPIIRAS. Issue 2 (25). SPb: Nauka, 2013. P. 148-170 . (in Russian).
  7. Philipp Nesteruk, Igor Kotenko. Tools for creation of neural network components of intelligent information security systems. Proceedings of SPIIRAS. Issue 3 (26). St. Petersburg, Nauka, 2013. P.7-25. (in Russian).
  8. Igor Kotenko, Olga Polubelova, Andrey Chechulin. Design of the ontology based data model for the network attack modeling system. Proceedings of SPIIRAS. Issue 3 (26). St.Petersburg, Nauka, 2013. P.26-39. (in Russian).
  9. Vasily Desnitsky, Igor Kotenko. Configuring embedded information protection systems within services providing complex security on rail transport. Proceedings of SPIIRAS. Issue 7 (30). St.Petersburg, Nauka, 2013. P. 40-55. (in Russian).
  10. Igor Kotenko, Doynikova E.V., Chechulin A.A. Dynamical recalculation of the security metrics on the example of attack potentiality. Proceedings of SPIIRAS. Issue 7 (30). St. Petersburg, Nauka, 2013. P. 26-39. ISSN: 2078-9181. (in Russian).
  11. Igor Kotenko, Igor Saenko, Andrey Chernov, Maria Butakova. The construction of a multi-level intelligent information security system for automated systems of railway transport. Proceedings of SPIIRAS.Issue 7 (30). SPb: Nauka, 2013. P. 7-25. (in Russian).
  12. Igor Kotenko, Evgenia Novikova. The Visual Analysis For Computer Network Security Assessment// Information and Control Systems, 2013, ¹ 3, pp.55-61. (in Russian).
  13. Igor Kotenko, Igor Saenko. Perspective Methods and Models for Computer Networks Security and Security Support for Cyber Security: review of International Conference of MMM-ACNS-2012 and Workshop SA&PS4CS 2012. Management-information systems, 2013, No. 3, P. 97-99. (in Russian).
  14. Vasily Desnitsky, Igor Kotenko. Configuration based design of security embedded devices. Problems of information security. Computer systems. ¹ 1, 2013, P.44-54. (in Russian).
  15. Olga Polubelova, Igor Kotenko. The verification technique of security policy filtration rules based on model checking. Problems of information security. Computer systems, ¹ 1, 2013. pp.151-168. (in Russian).
  16. Evgenia Novikova, Igor Kotenko. The design of the visualisation subsystem of the SIEM-system// Information Technologies , ¹ 9, 2013..Moscow, New Technology, pp.32-36. (in Russian).
  17. Igor Kotenko, Igor Saenko. International Conference "Mathematical Methods, Models and Architectures for Computer Networks Security" (MMM-ACNS-2012) and the International Workshop "Scientific Analysis and Policy Support for Cyber Security" (SA&PS4CS 2012). Information Security. Inside, 2013, No. 1, P. 8-9 . (in Russian).
  18. Igor Kotenko, Igor Saenko. Intellectual services for information security in computer networks and systems. Information Security. Inside, 2013, No. 2, P. 32-41. (in Russian).
  19. Igor Kotenko, Andrey Shorov. Infrastructure attack protection mechanisms based on bio-inspired approach "Network Nervous System". Issues of information Protection, ¹2, 2013. P.57-66. (in Russian).
  20. Igor Kotenko, Evgenia Novikova. Visualization Techniques for Security Information and Event Management// Issues of Information Protection, ¹ 3, 2013. pp.33-42. (in Russian).
  21. Dmitry Komashinskiy, Igor Kotenko Data mining methods for malware detection: review of state-of-the-art. Issues of information Protection, ¹4, 2013. P.21-33. (in Russian).
  22. Igor Kotenko, Igor Saenko. Proposals for the construction of a multi-level intelligent information security system for automated systems of railway transport. Herald of Rostov State University of communications, 2013, No. 3. P. 69-79. ISSN 0201-727X. (in Russian).
  23. Igor Kotenko, Igor Saenko, Rafael Yusupov. Perspective models and methods for computer networks security. Herald of the Russian Academy of Sciences, Vol. 83, No. 5, 2013. P. 84-85. (in Russian).
  24. Igor Kotenko, Andrey Chechulin. Usage of attack graphs for network security evaluation and security events processing. High availability systems, ¹3 (9), 2013. P.103-111. (in Russian).
  25. Vasily Desnitsky, Igor Kotenko, Andrey Chechulin. Information flow verification for design of protected information systems with embedded devices. High availability systems, ¹ 3 (9), 2013. P.112-118. (in Russian).
  26. Dmitry Komashinskiy, Igor Kotenko, Andrey Chechulin, Andrey Shorov. Automatic system for categorization of websites for blocking web pages with inappropriate.High availability systems, ¹3 (9), 2013. P.119-127. (in Russian).
  27. Igor Kotenko, Andrey Shorov. Investigation of bioinspired approaches for protection against infrastructure attacks based on simulation framework. Technical science - from theory to practice, ¹16-1, 2013. Novosibirsk, SibAK, 2013. pp.39-43. (in Russian).
  28. Dmitry Kotenko, Igor Kotenko, Igor Saenko. Attacks modeling in large computer networks. Technical sciences - from theory to practice, No. 17-1, 2013. Novosibirsk: Publishing House «SibAK», 2013. P. 12-16. (in Russian).
  29. Igor Kotenko, Igor Saenko. Intelligent Services System of information security for critical infrastructure. Technical sciences - from theory to practice, No. 17-1, 2013. Novosibirsk: Publishing House «SibAK», 2013. P. 7-11 (in Russian).
  30. Igor Kotenko, Philipp Nesteruk, Andrey Shorov. A hybrid adaptive security system based on "nervous" and neural networks biometafors / / Innovations in science, ¹ 16-1, 2013. Novosibirsk:. "SibAK", 2013. P.79-83. (in Russian).
  31. Igor Kotenko, Saenko I.B., Doynikova E.V. Risk assessment for the computer networks of the critical infrastructures. Innovations in Science, ¹ 16-1, 2013 / "Innovations in Science": Proceedings of XVI International Theoretical and Practical Conference. Part I. (28 January 2013); Novosibirsk: Publisher "SibAK", 2013. P.84-88. ISBN 978-5-4379-0210-3. (in Russian).
  32. Alexey Konovalov, Igor Kotenko, Andrey Shorov. Simulation-Based Study of Botnets and Defense Mechanisms against Them. Journal of Computer and Systems Sciences International, Vol.52, Issue 1, 2013. P.43-65. Pleiades Publishing, Ltd., ISSN 1064-2307. DOI: 10.1134/S1064230712060044.
  33. Igor Kotenko, Igor Saenko, Olga Polubelova, Andrey Chechulin. Design and Implementation of a Hybrid Ontological-Relational Data Repository for SIEM systems. Future internet, Vol. 5, No. 3, 2013. P. 355-375. ISSN 1999-5903. doi:10.3390/fi5030355.
  34. Dmitry Komashinskiy, Igor Kotenko. Intelligent Data Analysis for Malware Detection. International Journal of Computing, Research Institute of Intelligent Computer Systems, Ternopil National Economic University. 2013, Vol.12, Issue 1. P.63-74. ISSN 1727-6209.
  35. Igor Kotenko, Philipp Nesteruk, Andrey Shorov. Conception of a Hybrid Adaptive Protection of Information Systems. International Journal of Computing, Research Institute of Intelligent Computer Systems, Ternopil National Economic University. 2013, Vol.12, Issue 1. P.86-98. ISSN 1727-6209.
  36. Igor Kotenko, Elena Doynikova. Comprehensive Multilevel Security Risk Assessment of Distributed Information Systems. International Journal of Computing, Research Institute of Intelligent Computer Systems, Ternopil National Economic University. 2013, Vol.12, Issue 3. ISSN 1727-6209.
  37. Andrey Chechulin, Igor Kotenko. Construction of attack graphs for security events correlation. 15th Conference “RusCrypto” on Cryptology, Steganography, Digital Signature and Security Systems. Solnechnogorsk, Russia. March 28-30, 2013. http://www.ruscrypto.ru/ (in Russian).
  38. Igor Kotenko. Attack modeling, security analysis and visualisation in the SIEM-systems. 15th Conference “RusCrypto'2013”. Solnechnogorsk, Russia. March 28-30, 2013. http://www.ruscrypto.ru/ (in Russian).
  39. Vasily Desnitsky, Igor Kotenko, Andrey Chechulin. Design of secure information systems with embedded devices. 15th Conference “RusCrypto”. Solnechnogorsk, Russia. March 28-30, 2013. http://www.ruscrypto.ru/ (in Russian).
  40. Dmitry Komashinskiy, Andrey Chechulin, Igor Kotenko, Andrey Shorov. Categorization of web sites for inadmissible web pages blocking systems. 15th Conference “RusCrypto” on Cryptology, Steganography, Digital Signature and Security Systems. Solnechnogorsk, Russia. March 28-30, 2013. http://www.ruscrypto.ru/ (in Russian).
  41. Igor Kotenko Attack modeling, calculation of the security metrics and visualization in the perspective SIEM-systems. International forum on practical security “Positive Hack Days”. Moscow. May 23-24, 2013. http://www.phdays.ru (in Russian).
  42. Doynikova E.V, Igor Kotenko. Security assessment for the computer networks on the base of the attack graphs and multilevel system of the security metrics. Methods and technical tools of information security. Proceedings of the ÕXII All-Russian Conference. July 8 - 11, 2013. St.Petersburg. Polytechnical University publishing house. 2013. P.18-20. (in Russian).
  43. Igor Kotenko, Saenko I.B., Doynikova E.V., Polubelova O.V. Application of the ontology of the security metrics for the decision support in cyber security. Methods and technical tools of information security. Proceedings of the ÕXII All-Russian Conference. July 8 - 11, 2013. St.Petersburg. Polytechnical University publishing house. 2013. P.32-33. (in Russian).
  44. Andrey Shorov, Andrey Chechulin, Igor Kotenko. Categorization of web sites for inadmissible web pages blocking for decision support systems in cyber security. Tools for security analysis of automated systems. ÕXII All-Russian Conference “Methods and technical tools of information security” (MTTIS 2013)”. Proceedings. St.Petersburg, Russia. July 08-11, 2013. P.75-77. (in Russian).
  45. Saenko I.B., Igor Kotenko, Polubelova O.V., Doynikova E.V. Application of the ontology of the security metrics for the selection of the countermeasures for the computer networks security. Proceedings of the International congress IS&IT - International Conference on Artificial Intelligence and Systems. Moskow, Fizmathlit, 2013. Vol.2. P.372-377. ISBN 978-5-9221-1479-0. (in Russian).
  46. Igor Saenko, Igor Kotenko, Ivan Morozov. Use of genetic algorithms for the access control in geographic information systems. International congress IS&IT - International Conference on Artificial Intelligence and Systems. Proceedings. Divnomorskoye, Black Sea Coast, Russia. September 1-8. Moskow, Physmathlit, 2013. Vol. 2. P 58-63. ISBN 978-5-9221-1479-0 . (in Russian).
  47. Igor Kotenko, Igor Saenko. On construction a multi-level intelligent information security system for automated systems of railway transport. The VIII St.Petersburg Interregional Conference “Information Security of Russian Regions” (ISRR-2013). October 23-25, 2013. Proceedings. St.Petersburg, 2013.. P. 107-108 . (in Russian).
  48. Vasily Desnitsky, Igor Kotenko. Configuring embedded information protection systems within services of multi-level intelligent system of rail transport complex security. VIII Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2013)", Saint-Petersburg, October 23-25, 2013. The proceedings of conference, 2013. P.91-92. (in Russian).
  49. Igor Kotenko, Evgenia Novikova. An approach to design of the visual analytical system for security information management on Russian Railways. VIII St.Petersburg Interregional Conference “Information Security of Russian Regions (ISRR-2011)”. October 23-25, 2013. Proceedings. P.106-107. (in Russian).
  50. Igor Kotenko, Igor Saenko, Olga Polubelova, Elena Doynikova. Ontology of the security metrics for the computer network as basis for the selection of the countermeasures. The VIII St.Petersburg Interregional Conference “Information Security of Russian Regions” (ISRR-2013). October 23-25, 2013. Proceedings of the conference. St.Petersburg, 2013. P.108-109. (in Russian).
  51. Andrey Shorov, Andrey Chechulin, Igor Kotenko. Categorization of web sites for inadmissible web pages blocking systems by textual and graphical content analysis. The VIII St.Petersburg Interregional Conference «Information Security of Russian Regions (ISRR-2013). October 23-25, 2013. Proceedings. St.Petersburg, 2013. P.129-130. (in Russian).
  52. Igor Kotenko. Intellectual information security services in security monitoring and management systems of critical infrastructures. The VIII St.Petersburg Interregional Conference “Information Security of Russian Regions” (ISRR-2013). October 23-25, 2013. Proceedings. St.Petersburg, 2013. (in Russian).
  53. Igor Kotenko, Andrey Shorov, Evgenia Novikova. Simulation of Protection Mechanisms Based on "Network Nervous System" against Infrastructure Attacks. Proceedings of the 21th Euromicro International Conference on Parallel, Distributed and network-based Processing (PDP 2013). Belfast, Northern Ireland, UK. 27th February – 1st March 2013. Los Alamitos, California. IEEE Computer Society. 2013. P.526-533.
  54. Evgenia Novikova, Igor Kotenko. Analytical Visualization Techniques for Security Information and Event Management. Proceedings of the 21th Euromicro International Conference on Parallel, Distributed and network-based Processing (PDP 2013). Belfast, Northern Ireland, UK. 27th February – 1st March 2013. Los Alamitos, California. IEEE Computer Society. 2013. P.519-525.
  55. Igor Kotenko. Experiments with simulation of botnets and defense agent teams. 27th European Conference on Modelling and Simulation (ECMS 2013). Proceedings. May 27 - May 30st, Aalesund University College, Norway. 2013. P.61-67.
  56. Igor Kotenko, Andrey Chechulin. A Cyber Attack Modeling and Impact Assessment Framework. 5th International Conference on Cyber Conflict 2013 (CyCon 2013). Proceedings. IEEE and NATO COE Publications. 4-7 June 2013, Tallinn, Estonia. 2013. P.119-142. (WoS, Scopus)
  57. Igor Kotenko, Igor Saenko, Olga Polubelova and Elena Doynikova. The Ontology of Metrics for Security Evaluation and Decision Support in SIEM Systems. The 2nd International Workshop on Recent Advances in Security Information and Event Management (RaSIEM 2013). In conjunction with the 8th International Conference on Availability, Reliability and Security (ARES 2013). September 2nd – 6th, 2013. Regensburg, Germany. IEEE Computer Society. 2013. P.638-645.
  58. Igor Kotenko, Evgenia Novikova. VisSecAnalyzer: a Visual Analytics Tool for Network Security Assessment. 3rd IFIP International Workshop on Security and Cognitive Informatics for Homeland Defense (SeCIHD 2013). In conjunction with the 8th International Conference on Availability, Reliability and Security (ARES 2013). September 2-6, 2013, Regensburg, Germany. Lecture Notes in Computer Science (LNCS), Vol.8128. Springer. 2013, P.345-360.
  59. Igor Kotenko, Andrey Chechulin. Computer Attack Modeling and Security Evaluation based on Attack Graphs. The IEEE 7th International Conference on “Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications” (IDAACS'2013). Proceedings. Berlin, Germany, September 12-14, 2013. P.614-619. (Scopus)
  60. Igor Kotenko, Elena Doynikova. Security metrics for risk assessment of distributed information systems. The IEEE 7th International Conference on “Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications” (IDAACS'2013). Proceedings. Berlin, Germany, September 12-14, 2013. P.646-650.

2012

  1. Vasily Desnitsky, Igor Kotenko, Andrey Chechulin. Configuration of secure systems with embedded and mobile devices. Issues of information Protection, No 2, 2012. P.20-28. (in Russian).
  2. Igor Kotenko, Philipp Nesteruk, Andrey Shorov. Protection Methods of Computer Network based on bioinspired approaches. Issues of information Protection, No 2, 2012. P. 35-46. (in Russian).
  3. Dmitry Komashinskiy, Igor Kotenko. Evaluation of structural peculiarities of harmful documents on the basis of Data Mining. Information Technologies and Computing Systems, ¹ 2, 2012, P.76-92. (in Russian).
  4. Dmitry Komashinskiy, Igor Kotenko. Detection of harmful PDF documents on the basis of intelligent data analysis. Problems of information security. Computer systems. ¹ 1, 2012, P.19-35. (in Russian).
  5. Igor Kotenko, Igor Saenko, Olga Polubelova, Andrey Chechulin. Methods for security event and information management for computer networks protection. Problems of information security. Computer systems. ¹ 3, 2012. P.57-68. (in Russian).
  6. Andrey Chechulin, Igor Kotenko, Vasily Desnitsky. Information flow analysis for development of secure systems with embedded devices. High availability systems, ¹ 2, 2012. P.116-122. (in Russian).
  7. Olga Polubelova, Igor Kotenko, Igor Saenko, Andrey Chechulin. Application of the ontological approaches and logical inference to security event and information management. High availability systems, ¹ 2, 2012. P.100-108. (in Russian).
  8. Evgenia Novikova, Igor Kotenko. Visualzation Techniques in SIEM-systems // High availability systems, ¹ 2, 2012. P.91-99. (in Russian).
  9. Vasily Desnitsky, Igor Kotenko, Andrey Chechulin. Configuring components of combined protection of embedded devices on the basis of solving optimality task. High availability systems, ¹ 2, 2012. P.50-56. (in Russian).
  10. Vasily Desnitsky, Igor Kotenko. A model for configuring protected and energy-efficient embedded systems. Instrument making, Vol.55, ¹ 11, 2012. P.52–57. ISSN 0021-3454. (in Russian).
  11. Dmitry Komashinskiy, Igor Kotenko. An extraction method for structural features to detect harmful software. Instrument making, Vol.55, ¹ 11, 2012, P.58-62. (in Russian).
  12. Igor Kotenko, Igor Saenko, Olga Polubelova, Andrey Chechulin. Application of the methods of security event and information management for information protection in the critical infrastructures. Proceedings of SPIIRAS. Issue 1 (20). St.Petersburg, Nauka, 2012. P.27-56. (in Russian).
  13. Igor Kotenko, Andrey Shorov. Simulation of the Protection Mechanisms against Infrastructural Attacks based on “Nervous Network System”. Proceedings of SPIIRAS. Issue 3 (22). St. Petersburg, Nauka, 2012. P. 45–70. (in Russian).
  14. Igor Kotenko, Igor Saenko. Building a system of intelligent services for information security in cyber warfare. Proceedings of SPIIRAS. Issue 3 (22). St. Petersburg, Nauka, 2012. P.84-100. (in Russian).
  15. Olga Polubelova, Igor Kotenko. Verification of security policy filtering rules containing temporal parameters by Model Checking. Proceedings of SPIIRAS. Issue 3 (22). St. Petersburg, Nauka, 2012. P.113-138. (in Russian).
  16. Dmitry Kotenko, Igor Kotenko, Igor Saenko. Methods and tools for simulation of attacks in large computer networks: state of the problem. Proceedings of SPIIRAS. Issue 3 (22). St. Petersburg, Nauka, 2012. P.5-30. (in Russian).
  17. Dmitry Kotenko, Igor Kotenko, Igor Saenko. The method of iterative attacks modeling in large computer networks. Proceedings of SPIIRAS. Issue 4 (23). St. Petersburg, Nauka, 2012. P.50-79. (in Russian).
  18. Igor Kotenko, Philipp Nesteruk, Andrey Shorov. The concept of adaptive security of information technology systems based on paradigms of neural and nervous networks. Proceedings of SPIIRAS. Issue 4 (23). St. Petersburg, Nauka, 2012. P. 100-115. (in Russian).
  19. Evgenia Novikova, Igor Kotenko. Visualization technologies for security information and event management. Proceedings SPIIRAS. Issue.4 (23)., Russia. 2012. P.7-29. (in Russian).
  20. Igor Kotenko, Alexey Konovalov, Andrey Shorov. Investigative Simulation of Botnets and Defence Mechanisms against them. Appendix to the Information Technologies Journal. Moscow, New Technology, 2012, No 1. 32 pages. ISSN 1684-6400. (in Russian).
  21. Igor Kotenko, Elena Doynikova. SCAP protocol overview. Information Security. Inside, No 4, 2012. P.54-66. (in Russian).
  22. Igor Kotenko, Elena Doynikova, Andrey Chechulin. Total enumeration and classification of attack patterns (CAPEC): description and application examples. Information Security. Inside, No 4, 2012. P.54-66. (in Russian).
  23. Igor Kotenko, Igor Saenko. SIEM-systems for security information and event management. Information Security. Inside, No 5, 2012. P.2-12. (in Russian).
  24. Igor Kotenko, Igor Saenko, Rafael Yusupov. Intelligent security services as cybernetic counteraction tool // Scientific-Practical Proceedings on information counteraction problems, The Security Council of the Russian Federation. Moskow, 2012. (in Russian).
  25. Igor Kotenko, Alexey Konovalov, Andrey Shorov. Agent-based simulation of cooperative defense against botnets. Concurrency and Computation: Practice and Experience, Vol. 24, Issue 6, 2012. pp. 573-588.
  26. Andrey Chechulin, Igor Kotenko. Analysis of real-time events in a network using the network attacks modeling. The VII St.Petersburg Interregional Conference “Information Security of Russian Regions” (“ISRR-2011”). Proceedings of the conference. St.Petersburg, 2012. P.93-98. (in Russian).
  27. Igor Kotenko, Andrey Shorov, Philipp Nesteruk. The analysis of bio-inspired approaches to protect computer systems and networks. Proceedings of XVI All-Russian Scientific Conference «Neuroinformatics-2012». Issue 2. Moscow, MIPI, 2012. P.61-71. (in Russian).
  28. Igor Kotenko. Analytical attack modeling and event processing in security event and information management systems. 14th Conference “RusCrypto” on Cryptology, Steganography, Digital Signature and Security Systems. Solnechnogorsk, Russia. March 28-30, 2012. http://www.ruscrypto.ru/ (in Russian).
  29. Igor Kotenko. Cyberwars of software agents: application of the intelligent agent teamwork theory for cyber army building. International forum on practical security “Positive Hack Days”. Moscow. May 30-31, 2012. http://www.phdays.ru (in Russian).
  30. Vasily Desnitsky, Igor Kotenko. Configuring information and telecommunication systems with embedded devices. Tools for security analysis of automated systems. ÕXI All-Russian Conference “Methods and technical tools of information security” (MTTIS 2012)”. Proceedings. St.Petersburg, Russia. June 24-29, 2012. P.14-17. (in Russian).
  31. Elena Doynikova, Dmitry Kotenko, Igor Kotenko. Analysis of the intrusions using attack and service dependency graphs. Tools for security analysis of automated systems. ÕXI All-Russian Conference “Methods and technical tools of information security” (MTTIS 2012)”. Proceedings. St.Petersburg, Russia. June 24-29, 2012. P.45-47. (in Russian).
  32. Igor Kotenko, Andrey Chechulin. Analytical attack modeling in security event and information management systems. Tools for security analysis of automated systems. ÕXI All-Russian Conference “Methods and technical tools of information security” (MTTIS 2012)”. Proceedings. St.Petersburg, Russia. June 24-29, 2012. P.57-58. (in Russian).
  33. Philipp Nesteruk, Igor Kotenko. Formation of fuzzy knowledge base for adaptive information protection systems. ÕXI All-Russian Conference “Methods and technical tools of information security” (MTTIS 2012)”. Proceedings. St.Petersburg, Russia. June 24-29, 2012. P.64-65. (in Russian).
  34. Igor Saenko, Igor Kotenko, Olga Polubelova. The use of an ontological approach to construct a vulnerabilities’ model based on the SCAP. Tools for security analysis of automated systems. ÕXI All-Russian Conference “Methods and technical tools of information security” (MTTIS 2012)”. Proceedings. St.Petersburg, Russia. June 24-29, 2012. P.74-76. (in Russian).
  35. Andrey Chechulin, Vasily Desnitsky, Igor Kotenko. Information flow analysis for development of secure systems with embedded devices. Tools for security analysis of automated systems. ÕXI All-Russian Conference “Methods and technical tools of information security” (MTTIS 2012)”. Proceedings. St.Petersburg, Russia. June 24-29, 2012. P.35-37. (in Russian).
  36. Igor Kotenko, Andrey Chechulin. Analytical attack modeling for security event and information management. International congress IS&IT - International Conference on Artificial Intelligence and Systems. Proceedings. Divnomorskoye, Black Sea Coast, Russia. September 2-9. Moskow, Fizmathlit, 2012. Vol. 2. P. 385-391. (in Russian).
  37. Igor Kotenko, Igor Saenko. The use of genetic algorithms in optimization problems of the information access control. International congress IS&IT - International Conference on Artificial Intelligence and Systems. Proceedings. Divnomorskoye, Black Sea Coast, Russia. September 2-9. Moskow, Fizmathlit, 2012. Vol.1. P.40-45. (in Russian).
  38. Olga Polubelova, Igor Kotenko, Igor Saenko. Ontological approach to the construction of intelligent services for security event storage and processing. International congress IS&IT - International Conference on Artificial Intelligence and Systems. Proceedings. Divnomorskoye, Black Sea Coast, Russia. September 2-9. Moskow, Fizmathlit, 2012. Vol. 2. P.394-399. (in Russian).
  39. Igor Kotenko, Rafael Yusupov. Cybersecurity: current state and development trends The St.Petersburg Scientific Forum “Science and Society. Information technologies”. Seventh St.Petersburg Meeting of the Nobel Prize laureates. Proceedings. St.Petersburg. 2012. P.55-56. (in Russian).
  40. Andrey Shorov, Igor Kotenko. The Bioinspired Approaches to Protect Computer Networks from Infrastructure Attacks. St. Petersburg Scientific Forum “Science and Society”. “Science and Mankind Progress”. VII St. Petersburg Nobel Prize Laureates Meeting. Proceedings. St.Petersburg. P.149-150. (in Russian).
  41. Evgenia Novikova, Chechulin A.A., Igor Kotenko. Visualisation techniques for computer attack counteraction in security information and event management systems. St. Petersburg Scientific Forum “Science and Society”. “Science and Mankind Progress”. VII St.Petersburg Nobel Prize Laureates Meeting. Proceedings. St.Petersburg, Russia. P.151-152. (in Russian).
  42. Igor Kotenko, Rafael Yusupov. Current state and development trends in the field of construction of secure computer systems. Conference on Information Technologies in Control (ITC) held in conjunction with 5-th Russian Multiconference on Problems in Control (MPC). Proceedings. St.Petersburg, Russia. October 9–11, 2012. P.671-675. (in Russian).
  43. Vasily Desnitsky, Igor Kotenko, Andrey Chechulin. Design of secure embedded systems in European Union project SecFutur. Conference on Information Technologies in Control (ITC) held in conjunction with 5-th Russian Multiconference on Problems in Control (MPC). Proceedings. St.Petersburg, Russia. October 9–11, 2012. P.699-708. (in Russian).
  44. Andrey Chechulin, Igor Kotenko, Evgenia Novikova, Elena Doynikova. Attacks and protection mechanisms in the security event and information management. Conference on Information Technologies in Control (ITC) held in conjunction with 5-th Russian Multiconference on Problems in Control (MPC). Proceedings. St.Petersburg, Russia. October 9–11, 2012. P.735-739. (in Russian).
  45. Olga Polubelova, Igor Kotenko, Igor Saenko. Methods of data representation and inference for security information and events management. Conference on Information Technologies in Control (ITC) held in conjunction with 5-th Russian Multiconference on Problems in Control (MPC). Proceedings. St.Petersburg, Russia. October 9–11, 2012. P.723-728. (in Russian).
  46. Vasily Desnitsky, Andrey Chechulin, Igor Kotenko. Using anytime algorithms of attack modeling and security evaluation in SIEM systems. XIII Saint-Petersburg International Conference “Regional informatics-2012” (“RI-2012”). Proceedings. St. Petersburg, 2012. P. 92. (in Russian).
  47. Elena Doynikova, Igor Kotenko Integrated approach for security metric set constructing for risk assessment and reaction to intrusions. XIII Saint-Petersburg International Conference “Regional informatics-2012” (“RI-2012”). Proceedings. St. Petersburg, 2012. P. 94. (in Russian).
  48. Igor Kotenko, Philipp Nesteruk. On the development of an adaptive information protection system for computer networks. XIII Saint-Petersburg International Conference “Regional informatics-2012” (“RI-2012”). Proceedings. St. Petersburg, 2012. P.102. (in Russian).
  49. Andrey Chechulin, Igor Kotenko. Attack graph building based on malefactor models and information on vulnerabilities and attack patterns. XIII Saint-Petersburg International Conference “Regional informatics-2012” (“RI-2012”). Proceedings. St. Petersburg, 2012. P.129-130. (in Russian).
  50. Igor Saenko, Igor Kotenko. Design and Performance Evaluation of Improved Genetic Algorithm for Role Mining Problem. Proceeding of the 20th International Euromicro Conference on Parallel, Distributed and Network-based Processing (PDP 2012). Garching/Munich, February, 2012. P.269-274.
  51. Jose Fran. Ruiz, Vasily Desnitsky, Rajesh Harjani, Antonio Manna, Igor Kotenko and Andrey Chechulin. A Methodology for the Analysis and Modeling of Security Threats and Attacks for Systems of Embedded Components. Proceeding of the 20th International Euromicro Conference on Parallel, Distributed and Network-based Processing (PDP 2012). Garching/Munich, February, 2012. P.261-268. (Scopus)
  52. Igor Kotenko, Andrey Chechulin and Elena Doynikova. Analytical Attack Modeling in Security Information and Event Management Systems. Proceedings of the Work in Progress Session held in connection with the 20th Euromicro International Conference on Parallel, Distributed and network-based Processing (PDP 2012). Garching/Munich, February 2012. SEA-Publications. SEA-SR-31. 2012. P.27-28.
  53. Igor Kotenko, Olga Polubelova, Igor Saenko. Hybrid Data Repository Development and Implementation for Security Information and Event Management. Proceedings of the Work in Progress Session held in connection with the 20th Euromicro International Conference on Parallel, Distributed and network-based Processing (PDP 2012). Garching/Munich, February 2012. SEA-Publications. SEA-SR-31. 2012. P.29-30.
  54. Vasily Desnitsky, Igor Kotenko, Andrey Chechulin. Configuration-based approach to embedded device security. Lecture Notes in Computer Science, Springer-Verlag. The Sixth International Conference "Mathematical Methods, Models and Architectures for Computer Networks Security" (MMM-ACNS-2012). October 17-19, 2012, St. Petersburg, Russia. P.270-285. (Scopus)
  55. Andrey Chechulin, Igor Kotenko, Vasily Desnitsky. An Approach for Network Information Flow Analysis for Systems of Embedded Components. Lecture Notes in Computer Science, Springer-Verlag. The Sixth International Conference "Mathematical Methods, Models and Architectures for Computer Networks Security" (MMM-ACNS-2012). October 17-19, 2012, St. Petersburg, Russia. P.146-155. (Scopus)
  56. D. Komashinskiy and Igor Kotenko. Using Low-Level Dynamic Attributes for Malware Detection based on Data Mining Methods. Lecture Notes in Computer Science, Springer-Verlag, Vol. 7531. The Sixth International Conference "Mathematical Methods, Models and Architectures for Computer Networks Security" (MMM-ACNS-2012). October 17-19, 2012, St. Petersburg, Russia. P.254-269.
  57. Igor Kotenko. Cyber Wars of Intelligent Agents in the Internet. The Second International Workshop “Scientific Analysis and Policy Support for Cyber Security” (SA&PS4CS 2012). St. Petersburg, Russia, October 20, 2012. P.10.
  58. Igor Kotenko, Andrey Chechulin, Evgenia Novikova. Attack Modelling and Security Evaluation for Security Information and Event Management. SECRYPT 2012. International Conference on Security and Cryptography. Proceedings. Rome, Italy. 24–27 July 2012. P. 391-394. (Scopus)
  59. Igor Kotenko, Olga Polubelova, Igor Saenko. Data Repository for Security Information and Event Management in service infrastructures. Proceedings of 9th International Joint Conference on e-Business and Telecommunications (ICETE 2012). International Conference on Security and Cryptography (SECRYPT 2012). Rome, Italy, 24–27 July, 2012. P.308-313.
  60. Igor Kotenko, Andrey Shorov. Simulation of Protection Mechanisms against Botnets on The Basis of “Nervous Network” Framework. Proceedings of the 2nd International Conference on Simulation and Modeling Methodologies, Technologies and Applications (SIMULTECH 2012), SciTePress, 2012. P.164-169.
  61. Igor Kotenko, Andrey Chechulin. Common Framework for Attack Modeling and Security Evaluation in SIEM Systems. 2012 IEEE International Conference on Green Computing and Communications, Conference on Internet of Things, and Conference on Cyber, Physical and Social Computing. Besançon, France, September 11-14, 2012. Los Alamitos, California. IEEE Computer Society. 2012. P. 94-101. (WoS, Scopus)
  62. Igor Kotenko, Olga Polubelova, Igor Saenko. The Ontological Approach for SIEM Data Repository Implementation. 2012 IEEE International Conference on Green Computing and Communications, Conference on Internet of Things, and Conference on Cyber, Physical and Social Computing. Besançon, France, September 11-14, 2012. Los Alamitos, California. IEEE Computer Society. 2012. P. 761-766.
  63. Igor Kotenko, Andrey Chechulin. Attack Modeling and Security Evaluation in SIEM Systems. International Transactions on Systems Science and Applications, SIWN Press. Volume 8. December 2012. pp. 129-147, ISSN 1751-1461 (print) ISSN 2051-5642 (online) sai: itssa.0008.2012.041.

2011

  1. Igor Kotenko, Alexey Konovalov, Andrey Shorov. Agent-based simulation of cooperative defence against botnets. Concurrency and Computation: Practice Experience. John Wiley Sons, 2011. Published online in Wiley Online Library (wileyonlinelibrary.com). DOI: 10.1002/cpe.1858.
  2. Igor Kotenko, Mikhail Stepashkin, Elena Doynikova. Security Analysis of Computer-aided Systems taking into account Social Engineering Attacks. Proceedings of the 19th Euromicro International Conference on Parallel, Distributed and network-based Processing (PDP 2011). Ayia Napa, Cyprus, 9-11 February, 2011. Los Alamitos, California. IEEE Computer Society. 2011. P.611-618. ISSN 1066-6192.
  3. Igor Saenko, Igor Kotenko. Genetic Algorithms for Role Mining Problem. Proceedings of the 19th Euromicro International Conference on Parallel, Distributed and network-based Processing (PDP 2011). Ayia Napa, Cyprus, 9-11 February, 2011. Los Alamitos, California. IEEE Computer Society. 2011. P.646-650. ISSN 1066-6192.
  4. Vasily Desnitsky, Igor Kotenko, Andrey Chechulin. An abstract model for embedded systems and intruders. Proceedings of the Work in Progress Session held in connection with the 19th Euromicro International Conference on Parallel, Distributed and network-based Processing (PDP 2011). Ayia Napa, Cyprus, February 2011. SEA-Publications. SEA-SR-29. 2011. P.25-26. ISBN 978-3-902457-29-5.
  5. Igor Kotenko. Cyber Security: Current State and Future Landscape. View from Russia. The Interface of Science, Technology & Security: Areas of most Concern, Now and Ahead. APCSS SEMINAR Proceedings, Honolulu, Hawaii, 4-8 October 2010. Asia-Pacific Center for Security Studies. USA. 2011.
  6. Igor Kotenko, Olga Polubelova. Verification of Security Policy Filtering Rules by Model Checking. Proceedings of IEEE Fourth International Workshop on "Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications" (IDAACS'2011). Prague, Czech Republic, 15-17 September 2011. P. 706-710. ISBN 978-1-4244-4882-1.
  7. Igor Kotenko, Alexey Konovalov, Andrey Shorov. Simulation of botnets and protection mechanisms against them: software environment and experiments. 16th Nordic Conference on Secure IT-Systems. October 26th-28th, 2011. Tallinn, Estonia, Preproceedings, Cybernetica, 2011. P. 119-126.
  8. Igor Kotenko, Andrey Chechulin, Elena Doynikova. Combining of Scanning Protection Mechanisms in GIS and Corporate Information Systems. Information Fusion and Geographic Information Systems. Proceedings of the 5th International Workshop on Information Fusion and Geographical Information Systems: Towards the Digital Ocean (IF&GIS 2011). Brest, France, May 10-11, 2011. Brest, France, 2011. Lecture Notes in Geoinformation and Cartography. Springer. 2011. P.45-58. ISSN 1863-2246. (Scopus)
  9. Igor Kotenko, Igor Saenko, Rafael Yusupov. Protection of Information Resources in Computer Networks. Herald of the Russian Academy of Sciences, Vol.81, No 8, August 2011. P.746-747. ISSN 1019:3316. (in Russian).
  10. Igor Kotenko, Igor Saenko, Rafael Yusupov. Scientific Analysis and Policy Support for Security in Cyberspace. Herald of the Russian Academy of Sciences, Vol.81, No 9, September 2011. P.844-845. ISSN 1019:3316. (in Russian).
  11. Igor Kotenko, Philipp Nesteruk, Andrey Chechulin. Combining of scanning detection mechanisms in computer networks. Information security problems, ¹ 3, 2011. P.30-34. (in Russian).
  12. Igor Kotenko, Alexey Konovalov. Andrey Shorov Agent-oriented simulation of botnets and defense against them. Protection issues of information, No 3, 2011. P.24-29. (in Russian).
  13. Dmitry Komashinkiy, Igor Kotenko, Andrey Chechulin. Categorization of web sites for inadmissible web pages blocking. High availability systems, ¹ 2, 2011. P.102-106. (in Russian).
  14. Igor Kotenko, Alexey Konovalov, Andrey Shorov. Simulation of Botnets and Defence Mechanisms against them. High availability systems, No 2, 2011. P.107-111. (in Russian).
  15. Igor Saenko, Igor Kotenko. Genetic optimization of role-based access schemes. High availability systems, No.2, 2011. P.112-116. (in Russian).
  16. Igor Kotenko, Mikhail Stepashkin, Elena Doynikova. Security analysis of information systems taking into account social engineering attacks. Problems of information security. Computer systems. 2011, ¹ 3. P.40-57. (in Russian).
  17. Igor Kotenko, Mikhail Stepashkin, Dmitry Kotenko, Elena Doynikova. Information systems security evaluation on the base of social engineering attacks trees. News of High schools. Instrument making, Ņ.54, ¹ 12, 2011. P.5-9. ISSN 0021-3454. (in Russian).
  18. Igor Kotenko, Andrey Shorov. The use of biological metaphors to protect computer systems and networks: a preliminary analysis of the basic approaches. Information Security. Inside, 2011. No 1, P.52-57. No 2, P.66-75. (in Russian).
  19. Igor Kotenko, Vasily Desnitsky, Andrey Chechulin. Investigation of technologies for secure embedded systems design in European Union project SecFutur. Information Security. Inside, No.3, 2011. P.68-75. (in Russian).
  20. Igor Kotenko, Elena Doynikova. Vulnerabilities assessment techniques: use for the computer systems security analysis. Information Security. Inside, No.4, 2011. P.74-81. (in Russian).
  21. Igor Kotenko, Elena Doynikova. Vulnerabilities Scoring System CVSS and its application for the computer systems security analysis. Information Security. Inside, No.5, 2011. P.54-60. (in Russian).
  22. Igor Kotenko, Elena Doynikova. Misuse and configuration scoring systems (CMSS and CCSS) for the unified computer systems security analysis. Information Security. Inside, No.6, 2011. P.52-60. (in Russian).
  23. Igor Kotenko, Andrey Shorov, Philipp Nesteruk. The analysis of bioinspired approaches to protect computer systems and networks. Proceedings of SPIIRAS. Issue 3 (18). St.Petersburg, Nauka, 2011. P.19-73. (in Russian).
  24. Igor Kotenko, Alexey Konovalov, Andrey Shorov. Simulation of Botnets and Defence Mechanisms against them: simulation environment and experiments. Proceedings of SPIIRAS. Issue 4 (19). St.Petersburg, Nauka, 2011. (in Russian).
  25. Vasily Desnitsky, Igor Kotenko, Andrey Chechulin. Constructing and testing secure embedded systems. XII Saint-Petersburg International Conference “Regional informatics-2010” (“RI-2010”). Selected Proceedings. St. Petersburg, 2011. P. 115-121. (in Russian).
  26. Igor Kotenko, Alexey Konovalov, Andrey Shorov. Simulation of defense against botnets in the Internet. XII Saint-Petersburg International Conference “Regional informatics-2010” (“RI-2010”). Selected Proceedings. St. Petersburg, 2011. P. 121-132. (in Russian).
  27. Andrey Chechulin, Igor Kotenko. Combining of scanning detection mechanisms. The Ninth All-Russian Scientific Conference "Mathematics and Security of Information Technologies" (MSIT-10). Moscow, 2011. (in Russian).
  28. Vasily Desnitsky, Igor Kotenko, Andrey Chechulin. Abstract model for embedded secure systems. The Nineth All-Russian Scientific Conference "Mathematics and Security of Information Technologies" (MSIT-10). Moscow, 2011. (in Russian).
  29. Alexey Konovalov, Igor Kotenko, Andrey Shorov. The experiments for exploring of botnets. The Nineth All-Russian Scientific Conference "Mathematics and Security of Information Technologies" (MSIT-10). Moscow, 2011. (in Russian).
  30. Igor Kotenko. Modeling and analysis of the cybersecurity mechanisms. 13th Conference “RusCrypto” on Cryptology, Steganography, Digital Signature and Security Systems. Solnechnogorsk, Russia. March 30 - April 2, 2011. http://www.ruscrypto.ru/ (in Russian).
  31. Igor Saenko, Igor Kotenko. Method of genetic optimization of schemes for role-based access to information. 13th Conference “RusCrypto” on Cryptology, Steganography, Digital Signature and Security Systems. Solnechnogorsk, Russia. March 30 - April 2, 2011. http://www.ruscrypto.ru/ (in Russian).
  32. Dmitry Komashinkiy, Andrey Chechulin, Igor Kotenko. Categorization of web pages with inadmissible content. 13th Conference “RusCrypto” on Cryptology, Steganography, Digital Signature and Security Systems. Solnechnogorsk, Russia. March 30 - April 2, 2011. http://www.ruscrypto.ru/ (in Russian).
  33. Elena Doynikova, Igor Kotenko. Extension of the informasion risks assessment techniques via application of the service dependency graphs. Tools for security analysis of automated systems. ÕX All-Russian Conference “Methods and technical tools of information security” (MTTIS 2011)”. Proceedings. St.Petersburg, Russia. June 27 - July 01, 2011. P.131-132. (in Russian).
  34. Igor Kotenko, Philipp Nesteruk. The principles of an adaptive security systems creation. Tools for security analysis of automated systems. ÕX All-Russian Conference “Methods and technical tools of information security” (MTTIS 2011)”. Proceedings. St.Petersburg, Russia. June 27 - July 01, 2011. P.32-33. (in Russian).
  35. Igor Saenko, Olga Polubelova, Igor Kotenko Design of SIEM repository for a heterogeneous infrastructure. Tools for security analysis of automated systems. ÕX All-Russian Conference “Methods and technical tools of information security” (MTTIS 2011)”. Proceedings. St.Petersburg, Russia. June 27 - July 01, 2011. P.41-42. (in Russian).
  36. Andrey Shorov, Igor Kotenko. The set-theoretic representation of simulation models of infrastructure attacks and defense mechanisms against them // The Fifth All-Russian scientific-practical conference on simulation and its application in science and industry "Simulation. Theory and practice (IMMOD-2009)". St.Petersburg, October 19-21, 2011. Proceedings. St.Petersburg, Technology Center of Shipbuilding and Ship Repair. 2011. P.306-310. (in Russian).
  37. Andrey Chechulin, Igor Kotenko. Analysis of security events in a real network using a network attack modelling system. The VII St.Petersburg Interregional Conference «Information Security of Russian Regions (ISRR-2011). October 26-28, 2011. Proceedings. St.Petersburg, 2011. P.97-98. (in Russian).
  38. Vasily Desnitsky, Igor Kotenko, Andrey Chechulin. Configuration model for combined protection of information systems with embedded devices. The VII St.Petersburg Interregional Conference «Information Security of Russian Regions (ISRR-2011). October 26-28, 2011. Proceedings. St.Petersburg, 2011. P.69-70. (in Russian).
  39. Elena Doynikova, Andrey Chechulin, Igor Kotenko, Dmitry Kotenko. Extension of the information risks assessment technique to consider zero day attacks. The VII St.Petersburg Interregional Conference «Information Security of Russian Regions (ISRR-2011). October 26-28, 2011. Proceedings. St.Petersburg, 2011. P.71-72. (in Russian).
  40. Igor Kotenko, Igor Saenko, Olga Polubelova, Andrey Chechulin. Methods and tools of designing the repository for SIEM system in critical information infrastructure. The VII St.Petersburg Interregional Conference «Information Security of Russian Regions (ISRR-2011). October 26-28, 2011. Proceedings. St.Petersburg, 2011. P.79-80. (in Russian).
  41. Dmitry Komashinkiy, Igor Kotenko. Methods of machine learning in anti-cyberthreat systems. The VII St.Petersburg Interregional Conference «Information Security of Russian Regions (ISRR-2011). October 26-28, 2011. Proceedings. St.Petersburg, 2011. P.76-77. (in Russian).
  42. Philipp Nesteruk, Igor Kotenko. The components of development of adaptive computer network security system. The VII St.Petersburg Interregional Conference «Information Security of Russian Regions (ISRR-2011). October 26-28, 2011. Proceedings. St.Petersburg, 2011. P.84-85. (in Russian).
  43. Igor Saenko, Igor Kotenko. An improved genetic algorithm to solve the role mining problem in RBAC systems. The VII St.Petersburg Interregional Conference “Information Security of Russian Regions (ISRR-2011)”. October 26-28, 2011. Proceedings. St.Petersburg, 2011. P.92-93. (in Russian).

2010

  1. V.Desnitsky, I.Kotenko. Combined software protection against unauthorized ifluences. News of High schools. Instrument making, Vol.53, No 11, 2010, P.36-41. ISSN 0021-3454. (in Russian).
  2. I.Kotenko, A.Konovalov, A.Shorov. Investigation of botnets and botnet defense based on simulation metnods. News of High schools. Instrument making, Vol.53, No 11, 2010, P.42-45. ISSN 0021-3454. (in Russian).
  3. A.Chechulin, I.Kotenko. Combining of scanning protection mechanisms in computer networks. Management-information systems, 2010, No 12, P.21-27. ISSN 1684-8853. (in Russian).
  4. V.Desnitsky, I.Kotenko. Protectability and scalability of software protection mechanism based on remote entrusting principles. Risks and security management. Proceedings of Institute of System Analysis of Russian Academy of Science. Moscow, 2010. (in Russian).
  5. D.Komashinskiy, I.Kotenko. Malware Detection by Data Mining Techniques Based on Positionally Dependent Features. Proceedings of the 18th Euromicro International Conference on Parallel, Distributed and network-based Processing (PDP 2010). Pisa, Italy, 17-19 February, 2010. Los Alamitos, California. IEEE Computer Society. 2010. P.617-623. ISSN 1066-6192. ISBN 978-0-7695-3939-3.
  6. I.Kotenko, A.Konovalov, A.Shorov. Agent-based Modeling and Simulation of Botnets and Botnet Defense. Conference on Cyber Conflict. Proceedings 2010. CCD COE Publications. Tallinn, Estonia, June 15-18, 2010. P.21-44. ISBN 978-9949-9040-1-3.
  7. I.Kotenko, V.Scormin (Eds.) Computer Network Security. Lecture Notes in Computer Science, Springer-Verlag, Vol. 6258. The Fifth International Conference "Mathematical Methods, Models and Architectures for Computer Networks Security" (MMM-ACNS-2010). September 8-10, 2010, St. Petersburg, Russia. 346 p. ISSN 0302-974.
  8. I.Saenko, I.Kotenko. Genetic Optimization of Access Control Schemes in Virtual Local Area Networks. Computer Network Security. Lecture Notes in Computer Science, Springer-Verlag, Vol. 6258. The Fifth International Conference "Mathematical Methods, Models and Architectures for Computer Networks Security" (MMM-ACNS-2010). September 8-10, 2010, St. Petersburg, Russia. P.209-216. ISSN 0302-9743.
  9. V.Desnitsky, I.Kotenko. Security and Scalability of Remote Entrusting Protection. Lecture Notes in Computer Science, Springer-Verlag, Vol. 6258. The Fifth International Conference "Mathematical Methods, Models and Architectures for Computer Networks Security" (MMM-ACNS-2010). September 8-10, 2010, St. Petersburg, Russia. P.298-306. ISSN 0302-9743.
  10. I.Kotenko, A.Konovalov, A.Shorov. Simulation of Botnets: Agent-based approach. Intelligent Distributed Computing IV. Studies in Computational Intelligence. Springer-Verlag, Vol.315. Proceedings of 4th International Symposium on Intelligent Distributed Computing - IDC'2010. September 16-18, 2010. Tangier, Morocco. Springer. P.247–252.
  11. D.Komashinskiy, I.Kotenko. Conceptual foundations of Data Mining methods for the detection of malicious software. Information Security. Inside. 2010. No 2, P.74-82. (in Russian).
  12. I.Kotenko, A.Konovalov, A.Shorov. Agent-oriented simulation of botnets functioning and defense against them. Information Security. Inside. 2010. No 4, P.36-45. No 5, P.56-61. (in Russian).
  13. I.Kotenko, I.Saenko, R.Yusupov. International Conference "Mathematical Methods, Models and Architectures for Computer Networks Security". Information Security. Inside. 2010. No 6, P.16-18. (in Russian).
  14. D.Komashinskiy, I.Kotenko, A.Shorov. Approach to detect malicious software on the basis of position-dependent information. Proceedings of SPIIRAS. Issue 10. St.Petersburg, Nauka, 2010. P.144-159. ISBN 978-5-02-025507-4. (in Russian).
  15. I.Kotenko, A.Konovalov, A.Shorov. Simulation of operation of teams of intelligent botnet and defense agents. 12th National Conference on Artificial Intelligence with International Participation (CAI-2010). Proceedings. Vol.3. September 20-24, 2010, Tver, Russia. Ģ.: Fizmatlit, 2010. P. 44-51. ISBN 978-5-7995-0543-1. (in Russian).
  16. V.Desnitsky, I.Kotenko. Development and analysis of remote entrusting protocol. The VI St.Petersburg Interregional Conference “Information Security of Russian Regions” (ISRR-2009). October 28-30, 2009. Proceedings. St.Petersburg, 2010. P.121-129. ISBN 978-5-904031-95-4. (in Russian).
  17. V.Desnitsky, I.Kotenko. Software protection based on the principle of remote entrusting. The 5th International Scientific Conference on Security Issues and Counter Terrorism. Lomonosov Moscow State University. October 29-30, 2009. Vol.2. The Eighth All-Russian Scientific Conference "Mathematics and Security of Information Technologies" (MSIT-09). Moscow, 2010. P. 159-163. ISBN 978-5-94057-693-8. (in Russian).
  18. D.Komashinskiy, I.Kotenko. Detecting malware based on the processing of static positional information using Data Mining methods. The 5th International Scientific Conference on Security Issues and Counter Terrorism. Lomonosov Moscow State University. October 29-30, 2009. Vol. 2. The Eighth All-Russian Scientific Conference "Mathematics and Security of Information Technologies" (MSIT-09). Moscow, 2010. P. 136-140. ISBN 978-5-94057-693-8. (in Russian).
  19. D.Komashinskiy, I.Kotenko. Combining Data Mining methods for static detection of Malware. 12th International Conference “RusCrypto” on Cryptology, Steganography, Digital Signature and Security Systems. Zvenigorod, Russia. April 1-4, 2010. http://www.ruscrypto.ru/ (in Russian).
  20. Y.Zozulya, I.Kotenko. Blocking Web-sites with inappropriate content based on categorization. 12th International Conference “RusCrypto” on Cryptology, Steganography, Digital Signature and Security Systems. Zvenigorod, Russia. April 1-4, 2010. http://www.ruscrypto.ru/ (in Russian).
  21. A.Konovalov, A.Shorov, I.Kotenko. Agent-oriented simulation of botnets. 12th International Conference “RusCrypto” on Cryptology, Steganography, Digital Signature and Security Systems. Zvenigorod, Russia. April 1-4, 2010. http://www.ruscrypto.ru/ (in Russian).
  22. I.Kotenko. Investigation of botnets and protection mechanisms against them on the basis of agent-based simulation. Proceedings of ÕIX All-Russian Conference “Methods and technical tools of information security” (MTTIS 2010)”. Proceedings. St.Petersburg, Russia. July 5 - 10, 2010. P.40-41. (in Russian).
  23. V.Desnitsky, I.Kotenko. Combined mechanisms to protect software from unauthorized modifications. Proceedings of ÕIX All-Russian Conference “Methods and technical tools of information security” (MTTIS 2010)”. Proceedings. St.Petersburg, Russia. July 5 - 10, 2010. P. 100-101 2010. (in Russian).
  24. A.Konovalov, I.Kotenko, A.Shorov. Simulation environment for imitating network attacks and defense mechanisms. Proceedings of ÕIX All-Russian Conference “Methods and technical tools of information security” (MTTIS 2010)”. Proceedings. St.Petersburg, Russia. July 5 - 10, 2010. P. 38-39. (in Russian).
  25. M.Stepashkin, I.Kotenko, A.Chechulin, A.Tulupyev, T.Tulupyeva, A.Pashenko. Approach to security analysis of automated systems taking into account social-engineering attacks. Proceedings of ÕIX All-Russian Conference “Methods and technical tools of information security” (MTTIS 2010)”. Proceedings. St.Petersburg, Russia. July 5 - 10, 2010. P. 128-129. (in Russian).
  26. I.Kotenko, M. Stepashkin, A.Chechulin, E.Doynikova, D.Kotenko. Tools for security analysis of automated systems. ÕIX All-Russian Conference “Methods and technical tools of information security” (MTTIS 2010)”. Proceedings. St.Petersburg, Russia. July 5-10, 2010. P.115-116. (in Russian).
  27. V.Desnitsky, A.Chechulin, I.Kotenko. Configuration model of embedded devices. XII International Conference “Regional informatics-2010” (“RI-2010”). Proceedings. St. Petersburg, October 20-22, 2010. P.41-42. ISBN 978-5-904031-99-2. (in Russian).
  28. A.Konovalov, I.Kotenko. Library of modules for botnet simulation. XII International Conference “Regional informatics-2010” (“RI-2010”). Proceedings. St. Petersburg, October 20-22, 2010. P.110-111. ISBN 978-5-904031-99-2. (in Russian).
  29. I.Kotenko, V.Desnitsky. An Aspect-oriented Approach to Realization of Mobile Module in the Security Model based on Remote Entrusting Mechanism. Information Technologies and Computing Systems, No.4, 2009, P.67-76. (in Russian).

2009

  1. Igor Kotenko, Victor Vorontsov, Andrey Chechulin, Alexander Ulanov. Proactive security mechanisms against network worms: approach, implementation and results of experiments. Information Technologies, No.1, 2009. P.37-42. (in Russian).
  2. Igor Kotenko, Alexander Ulanov. Multi-agent simulation of security mechanisms against distributed computer attacks. Information Technologies, No.2, 2009. P.38-44. (in Russian).
  3. Igor Kotenko, Alexander Ulanov. Investigation of models of counteracting the agents in computer networks. The Multiconference “Theory and Systems of Control”. IV International Conference on Control Sciences (ICCS-IV). January 26-30, 2009. Moscow. 2009. (in Russian).
  4. Igor Kotenko. Framework for Integrated Proactive Network Worm Detection and Response. Proceedings of the 17th Euromicro International Conference on Parallel, Distributed and network-based Processing (PDP 2009). Weimar, Germany. 3. February 18-20, 2009. IEEE Computer Society. 2009. P.379-386.
  5. Vasily Desnitsky, Igor Kotenko. Analysis and Design of Entrusting Protocol for Distributed Software Protection. Proceedings of the Work in Progress Session heldin connection with the 17th Euromicro International Conference on Parallel, Distributed and network-based Processing (PDP 2009). Weimar, Germany. February 2009. SEA-Publications: SEA-SR-21. 2009. P.8-9.
  6. Vasily Desnitsky, Igor Kotenko. Design and Analysis of Remote Entrusting Protocol. The 4th International Scientific Conference on Security Issues and Counter Terrorism. The Seventh All-Russian Scientific Conference "Mathematics and Security of Information Technologies" (MSIT-08). 2009. (in Russian).
  7. Dmitriy Komashinskiy, Igor Kotenko. Investigation of Proactive Mechanisms of Malware Detection based on Data Mining. The 4th International Scientific Conference on Security Issues and Counter Terrorism. The Seventh All-Russian Scientific Conference "Mathematics and Security of Information Technologies" (MSIT-08). 2009. (in Russian).
  8. Andrey Chechulin, Igor Kotenko. Protection against Network Attacks by Methods of Filtering and Normalization of Transport and Network Level Protocols. The 4th International Scientific Conference on Security Issues and Counter Terrorism. The Seventh All-Russian Scientific Conference "Mathematics and Security of Information Technologies" (MSIT-08). 2009. (in Russian).
  9. Igor Kotenko, Rafael Yusupov. Information Technologies for Counteraction against Terrorism. Information Security. Inside, No.2, 2009. (in Russian).
  10. Vasily Desnitsky, Igor Kotenko. Design of Entrusting Protocols for Software Protection. Fourth International Workshop “Information Fusion and Geographical Information Systems” (IF&GIS’09). St.Petersburg, Russia, May 17-20, 2009. Lecture Notes in Geoinformation and Cartography. Springer. 2009.
  11. Dmitriy Komashinskiy, Igor Kotenko. Using Data Mining methods for malware detection. Fourth International Workshop “Information Fusion and Geographical Information Systems” (IF&GIS’09). St.Petersburg, Russia, May 17-20, 2009. Lecture Notes in Geoinformation and Cartography. Springer. 2009.
  12. Andrey Chechulin, Igor Kotenko, Artem Tishkov, Yulia Zozulya, Andrey Shorov. Methods of protection against harmful Web-sites based on reputation evaluation. 11th Conference “RusCrypto” on Cryptology, Steganography, Digital Signature and Security Systems. Zvenigorod, Russia. April 2-5, 2009. http://www.ruscrypto.ru/. (in Russian).
  13. Dmitry Komashinsky, Igor Kotenko, Andrey Shorov. Malware Detection based on Data Mining. 11th Conference “RusCrypto” on Cryptology, Steganography, Digital Signature and Security Systems. Zvenigorod, Russia. April 2-5, 2009. http://www.ruscrypto.ru/ (in Russian).
  14. Vasily Desnitsky, Igor Kotenko. Approach to Software Protection based on Remote Entrusting Mechanism. 11th Conference “RusCrypto” on Cryptology, Steganography, Digital Signature and Security Systems. Zvenigorod, Russia. April 2-5, 2009. http://www.ruscrypto.ru/. (in Russian).
  15. Igor Kotenko. “Network cat-and-mouse”: wars of adaptive software agents. 11th Conference “RusCrypto” on Cryptology, Steganography, Digital Signature and Security Systems. Zvenigorod, Russia. April 2-5, 2009. http://www.ruscrypto.ru/ (in Russian).
  16. Igor Kotenko. Simulation of Agent Teams: the Application of Domain-Independent Framework to Computer Network Security. 23rd European Conference on Modelling and Simulation (ECMS2009). Madrid, Spain. June 9-12, 2009. P.137-143.
  17. Sergey Reznik, Igor Kotenko. Methods and Tools of verification for integrated analysis of security protocols. Information Security. Inside, No.3, 2009. P.56-72. (in Russian).
  18. Andrey Chechulin, Igor Kotenko. Detection and Counteraction of Network Attacks based on Combined Mechanisms of Traffic Analysis. ÕVIII All-Russian Conference “Methods and technical tools of information security” (MTTIS 2009)”. Proceedings. St.Petersburg, Russia. June 29 - July 2, 2009. P.69. (in Russian).
  19. Andrey Shorov, Alexei Konovalov, Igor Kotenko. Investigative Simulation of Botnets and Defence Mechanisms against them. ÕVIII All-Russian Conference “Methods and technical tools of information security” (MTTIS 2009)”. Proceedings. St.Petersburg, Russia. June 29 - July 2, 2009. P.132. (in Russian).
  20. Dmitry Komashinsky, Igor Kotenko, Andrey Shorov. Malware Detection Technology based on Data Mining. ÕVIII All-Russian Conference “Methods and technical tools of information security” (MTTIS 2009)”. Proceedings. St.Petersburg, Russia. June 29 - July 2, 2009. P.122-123. (in Russian).
  21. Igor Kotenko. Simulation of Defence Processes against Attacks on Infrastructure. ÕVIII All-Russian Conference “Methods and technical tools of information security” (MTTIS 2009)”. Proceedings. St.Petersburg, Russia. June 29 - July 2, 2009. P.63. (in Russian).
  22. Kotenko I.V., Reznik S.A., Shorov A.V. Security protocols verification combining existing approaches and tools. Proceedings of SPIIRAS. Issue 8. St.Petersburg, Nauka, 2009. P.292-310. (in Russian).
  23. Igor Kotenko. Design and Functioning Support of Intelligent Information Security Systems. The VI St.Petersburg Interregional Conference «Information Security of Russian Regions (ISRR-2009). October 28-30, 2009. Proceedings. St.Petersburg, 2009. P.112. (in Russian).
  24. Igor Kotenko. Multi-agent Simulation for Investigation of Information Security Machanisms in the Internet. The Fourth All-Russian scientific-practical conference on simulation and its application in science and industry "Simulation. Theory and practice (IMMOD-2009)". St.Petersburg, October 21-23, 2009. Proceedings. St.Petersburg, 2009. Vol. P.38-47. (in Russian).
  25. Vasily Desnitsky, Igor Kotenko. Performance and Scalability of Remote Entrusting Protection. Second International Workshop on Remote Entrusting (RE-TRUST 2009). September 30 - October 1, 2009. Riva del Garda, Italy, 2009.
  26. Igor Kotenko, Bogdanov V. Proactive Monitoring of Security Policy Accomplishment in Computer Networks. Proceedings of IEEE Fourth International Workshop on "Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications" (IDAACS'2009). Rende (Cosenza), Italy, September 21-23, 2009.
  27. Michail Stepashkin, Igor Kotenko. Security analysis of computer networks ans systems based on building of attack trees. The St.Petersburg Scientific Forum “Science and Society. Information technologies”. Forth St.Petersburg Meeting of the Nobel Prize laureates. Proceedings. St.Petersburg. 2009. P.363-366. (in Russian).
  28. Igor Kotenko, Rafael Yusupov. Counteraction to cyber terrorism: actual problems and perspective research directions. The St.Petersburg Scientific Forum “Science and Society. Information technologies”. Forth St.Petersburg Meeting of the Nobel Prize laureates. Proceedings. St.Petersburg. 2009. P.329-332. (in Russian).
  29. Igor Kotenko. Intelligent mechanisms of protection against malware propagation. International Conferences “Intelligent systems (AIS 2009)” and “Intelligent CAD (CAD-2009)”. Proceedings. Divnomorskoe, Russia. September 3-10, 2008. Vol.2. Moscow, Fizmatlit, 2009. P.431-438. (in Russian).
  30. Igor Kotenko. Intelligent mechanisms of cyber security management. Risks and security management. Proceedings of Institute of System Analysis of Russian Academy of Science. Vol.41, Moscow, URSS, 2009. P.74-103. (in Russian).

2008

  1. Igor Kotenko. Multi-agent modeling and the simulation of computer network security processes: “a game of network cats and mice”. NATO Science for Peace and Security Series, D: Information and Communication Security. Volume 17, 2008. Aspects of Network and Information Security. P.56-73. ISBN 978-1-58603-856-4.
  2. Igor Kotenko, Alexander Ulanov. Packet Level Simulation of Cooperative Distributed Defense against Internet Attacks. 16th Euromicro International Conference on Parallel, Distributed and network-based Processing (PDP 2008). Toulouse, France. February 13-15 2008. IEEE Computer Society. 2008. P.565-572. ISBN 0-7695-3089-3. ISSN 1066-6192.
  3. Igor Kotenko. Multi-agent Simulation of Attacks and Defense Mechanisms in Computer Networks. The Journal of Computing, Vol. 7, Issue 2, 2008. P.35-43.
  4. Alexander Ulanov, Igor Kotenko. Simulation of Adaptable Agent Teams in Internet. Workshop on Logics for Agents and Mobility (LAM'08). The European Summer School on Logic, Language and Information (ESSLLI 2008), Hamburg, Germany. 4 - 15 August, 2008. P.67-79. (in Russian).
  5. Igor Kotenko, Victor Vorontsov, Artem Tishkov, Andrey Chechulin, Alexander Ulanov. Investigation of Proactive Protection Mechanisms against Network Worms. Problems of Security and Counter Terrorism. Materials of the Third International Scientific Conference on Security Issues and Counter Terrorism. Moscow State University. 2008. P.278-283. (in Russian).
  6. Alexander Ulanov, Igor Kotenko. Simulation of Cooperative Mechanisms for Defense of Computer Networks. Problems of Security and Counter Terrorism. Materials of the Third International Scientific Conference on Security Issues and Counter Terrorism. Moscow State University. 2008. P.266-271. (in Russian).
  7. Igor Kotenko, Rafael Yusupov. Actual Research in Computer Network and System Security. V Interregional Conference “Information Security of Russian Regions (ISRR-2007)”. Selected Proceedings. St.Petersburg, 2008. P.21-31. (in Russian).
  8. Vasily Desnitsky, Igor Kotenko. Model of Software Protection based on “Remote Retrusting” Mechanism. V Interregional Conference “Information Security of Russian Regions (ISRR-2007)”. Selected Proceedings. St.Petersburg, 2008. P.172-177. (in Russian).
  9. Igor Kotenko, Alexander Ulanov. Investigation of Protection Mechanisms against DDoS Attacks: Imitation of Counteraction between Intelligent Agents in the Internet. 10th Conference “RusCrypto” on Cryptology, Steganography, Digital Signature and Security Systems. Zvenigorod, Russia. April 3-5, 2008. CD ROM. http://www.ruscrypto.ru/. (in Russian).
  10. Igor Kotenko. Proactive Protection Mechanisms against rapidly propagating Network Worms. 10th Conference “RusCrypto” on Cryptology, Steganography, Digital Signature and Security Systems. Zvenigorod, Russia. April 3-5, 2008 CD ROM. http://www.ruscrypto.ru/. (in Russian).
  11. Igor Kotenko, Vasily Desnitsky. Aspect-oriented Approach to Realization of Mobile Module in “Remote Retrusting” Protection Model. Information Technologies and Computing Systems, No.2, 2008. (in Russian).
  12. Vasily Desnitsky, Igor Kotenko. Model of Software Protection based on Remote Entrusting Mechanism. News of High schools. Instrument making, Vol.51, No.11, 2008. P.26-30. ISSN 0021-3454. (in Russian).
  13. Victor Vorontsov, Igor Kotenko. Analysis of Credit based Mechanism of Network Worm Epidemic Detection and Containment. News of High schools. Instrument making, Vol.51, No.11, 2008. P.21-26. ISSN 0021-3454. (in Russian).
  14. Ekaterina Sidelnikova, Artem Tishkov, Igor Kotenko. Filtering Policy Verification based on Event Calculus and Abduction Reasoning. News of High schools. Instrument making, Vol.51, No.11, 2008. P.31-35. ISSN 0021-3454. (in Russian).
  15. Olga Polubelova, Igor Kotenko. Verification of Filtering Rules of Security Policy by Model Checking. News of High schools. Instrument making, Vol.51, No.12, 2008. P.44-49. ISSN 0021-3454. (in Russian).
  16. Andrey Chechulin, Igor Kotenko. Investigation of Virus Throttling Defense Mechanisms against Network Worms. Information Security. Inside, No.3, 2008. Ń.68-73. (in Russian).
  17. Vasily Desnitsky, Igor Kotenko, Sergey Reznik. Design and Verification of message exchange protocol for software protection based on “Remote Entrusting” mechanism. Information Security. Inside, No.4, 2008. P.59-63; No.5, 2008. P.68-74. (in Russian).
  18. Vasily Desnitsky, Igor Kotenko, Sergey Reznik. Design and Analysis of message exchange protocol for software protection based on “Remote Entrusting”. ÕVII All-Russian Conference “Methods and technical tools of information security” (MTTIS 2008)”. Proceedings. St.Petersburg, Russia. June 27-29, 2008. (in Russian).
  19. Igor Kotenko, Victor Vorontsov, Andrey Chechulin. Detection and Containment of Spreading malware by means of combined protection mechanisms. ÕVII All-Russian Conference “Methods and technical tools of information security” (MTTIS 2008)”. Proceedings. St.Petersburg, Russia. June 27-29, 2008. (in Russian).
  20. Igor Kotenko, Artem Tishkov, Victor Vorontsov. Combining of malware protection mechanisms. International Conferences “Intelligent systems (AIS 2008)” and “Intelligent CAD (CAD-2008)”. Proceedings. Divnomorskoe, Russia. September 3-10, 2008. Moscow, Fizmatlit, 2008. (in Russian).
  21. Vasily Desnitsky, Igor Kotenko, Sergey Reznik. Design and Analysis of message exchange protocol for “Remote Entrusting” mechanism. International Conferences “Intelligent systems (AIS 2008)” and “Intelligent CAD (CAD-2008)”. Proceedings. Divnomorskoe, Russia. September 3-10, 2008. Moscow, Fizmatlit, 2008. (in Russian).
  22. Igor Kotenko, Alexander Ulanov. Simulation of adaptation of counteracting intelligent agent teams. XI National Conference on Artificial Intelligence with International Participation (NCAI-2008). Proceedings. Vol.1. Dubna, Russia. September 29 – October 3, 2008. Ģ.: URSS, 2008. P.32-40. ISBN 978-5-9710-0226-0. (in Russian).
  23. Igor Kotenko. Intelligent Mechanisms of Cyber-Security Management. Risks and security management. Proceedings of Institute of System Analysis of Russian Academy of Science. Moscow, URSS, 2008. (in Russian).
  24. Igor Kotenko, Rafael Yusupov. Information Technologies for Terrorism Counteraction. XI International Conference “Regional informatics-2008” (“RI-2008”). Proceedings. St. Petersburg, October 21-23, 2008. P.39-40. (in Russian).
  25. Andrey Shorov, Igor Kotenko. Protection of Computer Network against Infrastructure Attacks based on “Network Nervous System” Realization. XI International Conference “Regional informatics-2008” (“RI-2008”). Proceedings. St. Petersburg, October 21-23, 2008. P.118-119. (in Russian).
  26. Igor Kotenko, Victor Vorontsov, Andrey Chechulin. Analysis of Network Worm Detection and Containment Mechanisms. V Interregional Conference “Information Security of Russian Regions (ISRR-2007)”. Selected Proceedings. St.Petersburg, 2008. P.113-119. (in Russian).

2007

  1. Igor Kotenko, Alexander Ulanov. Agent-Oriented Environment for Simulation and Evaluation of “Distributed Denial of Service” Defence Mechanisms. News of High schools. Instrument making, Vol.50, No. 1, 2007, P.18-21. (in Russian).
  2. Igor Kotenko, Rafael Yusupov. Computer security Technologies. Herald of the Russian Academy of Sciences, Vol.77, No. 4, 2007. P.323-333. (in Russian).
  3. Igor Kotenko, Alexander Ulanov. Multiagent Modeling and Simulation of Protecting the Information Resources of Computer Networks in the Internet. Journal of Computer and Systems Sciences International, No. 5, 2007, P.74-88. (in Russian).
  4. Igor Kotenko, Artem Tishkov, Olga Chervatuk, Sergey Reznik, Ekaterina Sidelnikova. System of Verification of Computer Network Security Policy. Herald of computer and information technologies, No. 11, 2007. P.48-56. (in Russian).
  5. Igor Kotenko, Alexander Ulanov. Modeling and Simulation of Adaptive Cooperative Defense against Computer Attacks in the Internet. Problems of risks and security management. Proceedings of Institute of System Analysis of Russian Academy of Science. Moscow, URSS, 2007. (in Russian).
  6. Igor Kotenko, Mikhail Stepashkin. Computer Network Security Evaluation based on Attack Graphs Analysis. Problems of risks and security management. Proceedings of Institute of System Analysis of Russian Academy of Science. Moscow, URSS, 2007. (in Russian).
  7. Alexander Ulanov, Igor Kotenko. Defense against DDoS Attacks: Mechanisms of Prevention, Detection, Source Tracking and Counteraction. Information Security. Inside, No. 1, 2007. P.60-67; No. 2, 2007. P.70-77; No. 3, 2007. P.62-69. (in Russian).
  8. Vitaly Bogdanov, Igor Kotenko. Proactive Monitoring of Security Policy Performance in Computer Networks. Information Security. Inside, No. 3, 2007. P.42-47; No. 4, 2007. P.66-72. (in Russian).
  9. Igor Kotenko, Alexander Ulanov. Computer Wars in the Internet: Modeling and Simulation of Program Agents Counteraction. Information Security. Inside, No. 4, 2007. P.38-45. (in Russian).
  10. Igor Kotenko. Automatic Detection and Constraining of Internet Worm Propagation: Brief Analysis of Modern Research. Information Security. Inside, No. 4, 2007. P.46-56. (in Russian).
  11. Igor Kotenko. International Conference “Mathematical Methods, Models and Architectures for Computer Networks Security” (MMMACNS-07). Information Security. Inside, No. 3, 2007, P.12; No. 4, 2007, P.56. (in Russian).
  12. Igor Kotenko, Artem Tishkov, Ekaterina Sidelnikova, Olga Chervatuk. Checking of Security Policy Rules for Corporate Computer Networks. Information Security. Inside, No. 5, 2007. P.46-49; No. 6, 2007. P.36-43. (in Russian).
  13. Igor Kotenko, Victor Vorontsov. Analytical Models of Network Worm Propagation. Proceedings of SPIIRAS. Issue 4, Vol.1. St.Petersburg, Nauka, 2007. P.225-238. (in Russian).
  14. Igor Kotenko, Victor Vorontsov, Alexander Ulanov. Models and Systems of Network Worm Propagation Simulation. Proceedings of SPIIRAS. Issue 4, Vol.1. St.Petersburg, Nauka, 2007. P.208-224. (in Russian).
  15. Igor Kotenko. Actual Issues of Modeling and Simulation of Information Security Processes on the basis of Technology of Intelligent Agents. Transactions of Saint Petersburg Electrotechnical University “LETI” (ETU). Special issue. Information science problems: philosophy, sociology of science, education. St.Petersburg, SPbETU “LETI”, 2007. P.93-109. (in Russian).
  16. Igor Kotenko, Alexander Ulanov. Opposition in the Internet: Modeling and Simulation of Counteraction to Distributed Cyber-attacks. Problems of Security and Counter Terrorism. Materials of the Second International Scientific Conference on Security Issues and Counter Terrorism. Moscow State University. 2007. P.485-494. (in Russian).
  17. Vitaly Bogdanov, Igor Kotenko. The Proactive Approach to Monitoring of Computer Network Policy. Problems of Security and Counter Terrorism. Materials of the Second International Scientific Conference on Security Issues and Counter Terrorism. Moscow State University. 2007. P.373-382. (in Russian).
  18. Artem Tishkov, Igor Kotenko, Ekaterina Sidelnikova, Olga Chervatuk. Detection and Resolution of Conflicts in Security Policies. Problems of Security and Counter Terrorism. Materials of the Second International Scientific Conference on Security Issues and Counter Terrorism. Moscow State University. 2007. P.172-185. (in Russian).
  19. Igor Kotenko, Mikhail Stepashkin. Evaluating the Computer Network Security on the Basis of Attack Graph Analysis. Problems of Security and Counter Terrorism. Materials of the Second International Scientific Conference on Security Issues and Counter Terrorism. Moscow State University. 2007. P.466-481. (in Russian).
  20. Vitaly Bogdanov, Igor Kotenko, Mikhail Stepashkin. Proactive Approach to Network Security Policy Monitoring. Proceedings of the International Security and Counteracting Terrorism Conference. Moscow. Lomonosov Moscow State University Intellectual Center. 2007. 4 p.
  21. Mikhail Stepashkin, Igor Kotenko, Vitaly Bogdanov. Network Security Evaluation based on Analysis of Attack Graphs. Proceedings of the International Security and Counteracting Terrorism Conference. Moscow. Lomonosov Moscow State University Intellectual Center. 2007. 5 p.
  22. Artem Tishkov, Igor Kotenko, Ekaterina Sidelnikova, Olga Chervatuk. Detection and Resolution of Inconsistencies in Security Policy. Proceedings of the International Security and Counteracting Terrorism Conference. Moscow. Lomonosov Moscow State University Intellectual Center. 2007. 5 p.
  23. Igor Kotenko, Alexander Ulanov. Confrontation in the Internet: Simulation of Counteraction to Distributed Cyber-Attacks. Proceedings of the International Security and Counteracting Terrorism Conference. Moscow. Lomonosov Moscow State University Intellectual Center. 2007. 4 p.
  24. Igor Kotenko, Artem Tishkov, Olga Chervatuk, Ekaterina Sidelnikova. Security Policy Verification Tool for Geographical Information Systems. Third International Workshop “Information Fusion and Geographical Information Systems” (IF&GIS’07). St.Petersburg, Russia, May 27-29, 2007. Lecture Notes in Geoinformation and Cartography. Springer. Popovich, Vasily V.; Schrenk, Manfred; Korolenko, Kyrill V. (Eds.). 2007. P.128-146.
  25. Julien Bourgeois, Abdoul Karim Ganame, Igor Kotenko, Alexander Ulanov. Software Environment for Simulation and Evaluation of a Security Operation Center. Third International Workshop “Information Fusion and Geographical Information Systems” (IF&GIS’07). St.Petersburg, Russia, May 27-29, 2007. Lecture Notes in Geoinformation and Cartography. Springer. Popovich, Vasily V.; Schrenk, Manfred; Korolenko, Kyrill V. (Eds.). 2007. P.111-127.
  26. Igor Kotenko, Alexander Ulanov. Multi-agent Framework for Simulation of Adaptive Cooperative Defense against Internet Attacks. Proceedings of International Workshop on Autonomous Intelligent Systems: Agents and Data Mining (AIS-ADM-07). St. Petersburg, Russia. June 3-5, 2007. Lecture Notes in Artificial Intelligence, Vol.4476, 2007. P.212-228.
  27. Igor Kotenko, Alexander Ulanov. Agent-based Simulation Environment and Experiments for Investigation of Internet Attacks and Defense Mechanisms. Proceedings of 21th European Conference on Modelling and Simulation (ECMS 2007). Prague, Czech Republic. 4-6 June 2007. P.146-155.
  28. Igor Kotenko, Olga Chervatuk, Ekaterina Sidelnikova, Artem Tishkov. Hybrid Multi-module Security Policy Verification. 2007 IEEE Workshop on Policies for Distributed Systems and Networks (Policy 2007). 13-15 June 2007. Bologna, Italy. 2007. P.277.
  29. Vitaly Bogdanov, Igor Kotenko. Proactive Monitoring of Performance of Computer Network Security Policy. Proceedings of ÕV All-Russian Conference “Methods and technical tools of information assurance”. June 27-29, 2007. St. Petersburg, SPbSPU. 2007. P.32. (in Russian).
  30. Igor Kotenko, Victor Vorontsov, Alexander Ulanov. Proactive Detection and Constraining of Network Worm Propagation. Proceedings of ÕV All-Russian Conference “Methods and technical tools of information assurance”. June 27-29, 2007. St. Petersburg, SPbSPU. 2007. P.91. (in Russian).
  31. Igor Kotenko, Alexander Ulanov. Simulation of Adaptive Opposition of Defense Systems to Distributed Attacks. Proceedings of ÕV All-Russian Conference “Methods and technical tools of information assurance”. June 27-29, 2007. St. Petersburg, SPbSPU. 2007. P.92. (in Russian).
  32. Igor Kotenko, Alexander Ulanov. Investigation of Cooperative Defense against DDoS. SECRYPT 2007. International Conference on Security and Cryptography. Proceedings. Barcelona, Spain. 28-31 July 2007. P.180-183.
  33. Igor Kotenko, Victor Vorontsov. Proactive Approach to Detection and Restraining of Network Worms. Proceedings of International Conferences “Intelligent systems (AIS'07)” and “Intelligent CAD (CAD-2007)”. Moscow, Fizmatlit, 2007. P.61-68. (in Russian).
  34. Vasily Desnitsky, Igor Kotenko. Models of Remote Authentication for Software Protection. Proceedings of International Conferences “Intelligent systems (AIS'07)” and “Intelligent CAD (CAD-2007)”. Moscow, Fizmatlit, 2007. P.43-50. (in Russian).
  35. Igor Kotenko. Multi-agent Modelling and Simulation of Cyber-Attacks and Cyber-Defense for Homeland Security. Proceedings of IEEE Fourth International Workshop on "Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications" (IDAACS'2007). Dortmund, Germany, 6-8 September, 2007. P.614-619.
  36. Mathematical Methods, Models and Architectures for Computer Networks Security. The Forth International Conference, MMM-ACNS 2007. St. Petersburg, Russia, September 13–15, 2007. Communications in Computer and Information Science (CCIS). Springer. Vladimir Gorodetsky, Igor Kotenko, Victor Skormin (Eds.). Vol.1, 2007. 416 p.
  37. Vitaly Bogdanov, Igor Kotenko. Policy-based Proactive Monitoring of Security Policy Performance. Mathematical Methods, Models and Architectures for Computer Networks Security. The Forth International Conference, MMM-ACNS 2007. St. Petersburg, Russia, September 13–15, 2007. Proceedings. Communications in Computer and Information Science (CCIS). Springer. Vladimir Gorodetsky, Igor Kotenko, Victor Skormin (Eds.). Vol.1, 2007. P.197-212.
  38. Artem Tishkov, Ekaterina Sidelnikova, Igor Kotenko. Event Calculus based Checking of Filtering Policies. Mathematical Methods, Models and Architectures for Computer Networks Security. The Forth International Conference, MMM-ACNS 2007. St. Petersburg, Russia, September 13–15, 2007. Proceedings. Communications in Computer and Information Science (CCIS). Springer. Vladimir Gorodetsky, Igor Kotenko, Victor Skormin (Eds.). Vol.1, 2007. P.248-253.
  39. Igor Kotenko. Models and Methods of Construction and Support of Functioning of Intelligent Adaptive Security Systems. Mathematical Methods of Pattern Recognition: The 13th All-Russian Conference (ĢĢŠR-13). Zelenogorsk. September 30 October 6, 2007. Proceedings. Moscow, MAKS Press, 2007. P.599-602. (in Russian).
  40. Alexander Ulanov, Igor Kotenko. Multiagent Environment for Carrying out of Experiments on Protection of Computer Networks. Mathematical Methods of Pattern Recognition: The 13th All-Russian Conference (ĢĢŠR-13). Zelenogorsk. September 30 October 6, 2007. Proceedings. Moscow, MAKS Press, 2007. P.631-634. (in Russian).
  41. Igor Kotenko, Victor Vorontsov. Use of Proactive Approach for Protection against Network Worms. Scientific-practical Symposium “National Information Systems and State Security”. Proceedings. Moscow, Russia. September 2007. P.78-81. (in Russian).
  42. Vasily Desnitsky, Igor Kotenko. Remote Authentication for Protection of Programs against Non-authorized Modification. Scientific-practical Symposium “National Information Systems and State Security”. Proceedings. Moscow, Russia. September 2007. P.81-84. (in Russian).
  43. Alexander Ulanov, Igor Kotenko. Simulation of Adaptive Cooperative Strategies of Defense against Internet Attacks. The Third All-Russian Scientific-practical Conference on Simulation and its Application in Science and Industry “Simulation. Theory and Practice (IMMOD-2005)”. St.Petersburg, Russia. October 17-19, 2007. Proceedings. St.Petersburg, 2007. Vol.II. P.211-215. (in Russian).
  44. Igor Kotenko, Alexander Ulanov, Artem Tishkov, Vitaly Bogdanov, Victor Vorontsov, Andrey Chechulin. Simulation of Network Worm Detection and Containment in Computer Networks. The Third All-Russian Scientific-practical Conference on Simulation and its Application in Science and Industry “Simulation. Theory and Practice (IMMOD-2005)”. St.Petersburg, Russia. October 17-19, 2007. Proceedings. St.Petersburg, 2007. Vol.II. P.106-109. (in Russian).
  45. Igor Kotenko, Rafael Yusupov. Actual Issues and Solutions in the Field of Protection of Computer Networks and Systems. V St.Petersburg Interregional Conference “Information Security of Russian Regions (ISRR-2007)”. St.Petersburg, Russia. October 23-25, 2007. Conference Proceedings. St.Petersburg, 2007. P.55-56. (in Russian).
  46. Artem Tishkov, Igor Kotenko. Computer Network Protection System based on Security Policy. V St.Petersburg Interregional Conference “Information Security of Russian Regions (ISRR-2007)”. St.Petersburg, Russia. October 23-25, 2007. Conference Proceedings. St.Petersburg, 2007. P.122-123. (in Russian).
  47. Vasily Desnitsky, Igor Kotenko. Model of Protecting the Programs against Non-authorized Changes on the Basis of Remote Trust Mechanism. V St.Petersburg Interregional Conference “Information Security of Russian Regions (ISRR-2007)”. St.Petersburg, Russia. October 23-25, 2007. Conference Proceedings. St.Petersburg, 2007. P.81. (in Russian).
  48. Victor Vorontsov, Igor Kotenko. Models of detection and containment of network worms on the basis of proactive approach. V St.Petersburg Interregional Conference “Information Security of Russian Regions (ISRR-2007)”. St.Petersburg, Russia. October 23-25, 2007. Conference Proceedings. St.Petersburg, 2007. P.47-48. (in Russian).
  49. Andrey Chechulin, Igor Kotenko. Mechanisms of protection against network worms on the basis of threshold random walk method. V St.Petersburg Interregional Conference “Information Security of Russian Regions (ISRR-2007)”. St.Petersburg, Russia. October 23-25, 2007. Conference Proceedings. St.Petersburg, 2007. P.70. (in Russian).

2006

  1. Igor Kotenko, Mikhail Stepashkin, Alexander Ulanov. Agent-based modeling and simulation of malefactors' attacks against computer networks. Security and Embedded Systems. D.N.Serpanos, R.Giladi (Eds.). IOS Press. 2006. P.139-146. ISSN 1574-5589.
    NATO-ASI-06-Cover.jpg [image/jpeg] (168841 bytes)
    NATO-ASI-06-paper.pdf [application/pdf] (187094 bytes)
  2. Igor Kotenko, Mikhail Stepashkin, Vitaly Bogdanov. Architectures and models of active security analysis components on the basis of imitation of malefactors' actions. Problems of information security. Computer systems. 2006, No. 2. (in Russian).
  3. Igor Kotenko, Mikhail Stepashkin. Systems - simulators: purpose, functions, architecture and the approach to realization. News of High schools. Instrument making, Vol.49, No. 3, 2006, P.3-8. (in Russian).
  4. Igor Kotenko, Mikhail Stepashkin, Vitaly Bogdanov. Security analysis of computer networks at various stages of their life cycle. News of High schools. Instrument making. Vol.49, No. 5, 2006, P.3-8. (in Russian).
  5. Igor Kotenko, Rafael Yusupov. Perspective directions of research in computer security field. Information Security. Inside, No. 2, 2006. P.46-57. (in Russian).
    inside-zi.2-Cover.jpg [image/jpeg] (438236 bytes)
    inside-zi.2-Paper.pdf [application/pdf] (1312129 bytes)
  6. Igor Kotenko, Mikhail Stepashkin. Security metrics for estimating the security level of computer networks on the basis of constructing attack graphs. Information Security. Inside, No. 3, 2006. P.36-45. (in Russian).
    inside-zi.3-Cover.jpg [image/jpeg] (415428 bytes)
    inside-zi.3-Paper.pdf [application/pdf] (1109875 bytes)
  7. Igor Kotenko, Alexander Ulanov. Simulation of "network cats and mice" game: multiagent technologies for research of cyber-counteraction between antagonistic teams of cyber-agents in the Internet. AI News, No. 3, 2006. (in Russian).
  8. Igor Kotenko, Alexander Ulanov. Software testbed and experiments for exploring counteraction of attack and defense agents in the Internet. Proceedings of the International Security and Counteracting Terrorism Conference. Moscow. Lomonosov Moscow State University Intellectual Center. 2006. P.80-93. (in Russian).
    ISCTC-06-Cover.jpg [image/jpeg] (87507 bytes)
    ISCTC-06-paper1.pdf [application/pdf] (335656 bytes)
  9. Kotenko I.V., Tishkov A.V., Chervatuk O.V. Architecture and Models for Security Policy Verification. Proceedings of the International Security and Counteracting Terrorism Conference. Moscow. Lomonosov Moscow State University Intellectual Center. 2006. P.253-262. (in Russian).
    ISCTC-06-paper2.pdf [application/pdf] (221722 bytes)
  10. Igor Kotenko, Alexander Ulanov. Agent-based Simulation of Distributed Defense against Computer Network Attacks. Proceedings of 20th European Conference on Modelling and Simulation (ECMS 2006). Bonn. Germany. May 28th - 31st, 2006. P.560-565.
    ECMS-06-Cover.jpg [image/jpeg] (496519 bytes)
    ECMS-06-Paper.pdf [application/pdf] (381970 bytes)
  11. Igor Kotenko, Alexander Ulanov. Antagonistic Agents in the Internet: Computer Network Warfare Simulation. The 9th International Conference on Information Fusion. Florence (Italy), 10-13 July, 2006.
    Fusion2006-Paper.pdf [application/pdf] (446339 bytes)
  12. Igor Kotenko, Mikhail Stepashkin. Network Security Evaluation based on Simulation of Malefactor's Behavior. SECRYPT 2006. International Conference on Security and Cryptography. Proceedings. Portugal. 7-10 August 2006. P.339-344.
    Secrypt-06-Cover.jpg [image/jpeg] (339392 bytes)
    Secrypt-06-Paper.pdf [application/pdf] (1171216 bytes)
  13. Igor Kotenko, Alexander Ulanov. Agent-based modeling and simulation of network softbots' competition. Knowledge-Based Software Engineering. Proceedings of the Seventh Joint Conference on Knowledge-Based Software Engineering (JCKBSE'06). Tallinn, Estonia. August 28-31. 2006. IOS Press, 2006. P.243-252.
    JKBSE-06-Cover.jpg [image/jpeg] (429831 bytes)
    JKBSE-06-Paper.pdf [application/pdf] (640629 bytes)
  14. Igor Kotenko, Alexander Ulanov. Simulation of Internet DDoS Attacks and Defense. 9th Information Security Conference. ISC 2006. Samos, Greece. August 30 - September 2, 2006. Proceedings. Lecture Notes in Computer Science, Vol. 4176, 2006. P.327-342.
    ISC-06-Cover.jpg [image/jpeg] (362983 bytes)
    ISC-06-Paper.pdf [application/pdf] (669099 bytes)
  15. Igor Kotenko, Mikhail Stepashkin. Analyzing network security using malefactor action graphs. IJCSNS International Journal of Computer Science and Network Security, Vol.6 No.6, June 2006. P.226-235. ISSN: 1738-7906.
    IJCSNS-06-06-Cover.jpg [image/jpeg] (235118 bytes)
    IJCSNS-06-06-Paper.pdf [application/pdf] (378933 bytes)
  16. Igor Kotenko, Alexander Ulanov. Simulation Environment for Investigation of Cooperative Distributed Attacks and Defense. 9th International Symposium on Recent Advances in Intrusion Detection. RAID 2006. Abstract and Poster sessions. Hamburg, Germany September 20-22, 2006.
    RAID-06-06-Abstract.pdf [application/pdf] (60473 bytes)
    RAID-06-06-Poster.pdf [application/pdf] (1247155 bytes)
  17. Igor Kotenko, Mikhail Stepashkin. Attack Graph based Evaluation of Network Security. The 10th IFIP Conference on Communications and Multimedia Security. CMS'2006. Heraklion, Greece. 19 - 21 October 2006. 2006. Proceedings. Lecture Notes in Computer Science, Vol. 4237, 2006. P.216-227.
    CMS-06-LNCS-4237-Cover.jpg [image/jpeg] (384830 bytes)
    CMS-06-LNCS-4237-Paper.pdf [application/pdf] (429758 bytes)
  18. Igor Kotenko, Alexander Ulanov. Agent Teams in Cyberspace: Security Guards in the Global Internet. International Conference on CYBERWORLDS. CW2006. Lausanne, Switzerland, November 28-30, 2006. Proceedings. IEEE Computer Society, 2006.
  19. Igor Kotenko, Alexander Ulanov. Research of mechanisms of assault and protection in the Internet. Proceedings of ÕV All-Russian Conference "Methods and technical tools of information assurance". June 26-28, 2006. St. Petersburg, SPbSPU. 2006. P.123. (in Russian).
  20. Igor Kotenko, Artem Tishkov. The approach to construction and realization of information security management system based on security policies in computer networks. Proceedings of ÕV All-Russian Conference "Methods and technical tools of information assurance". June 26-28, 2006. St. Petersburg, SPbSPU. 2006. P.122. (in Russian).
  21. Mikhail Stepashkin, Igor Kotenko. Technique of the analysis of computer network security based on modelling of the actions of internal and external infringers. Proceedings of ÕV All-Russian Conference "Methods and technical tools of information assurance". June 26-28, 2006. St. Petersburg, SPbSPU. 2006. P.121. (in Russian).
  22. Vitaly Bogdanov, Igor Kotenko. Proactive monitoring of correct implementation of computer network security policy. Proceedings of ÕV All-Russian Conference "Methods and technical tools of information assurance". June 26-28, 2006. St. Petersburg, SPbSPU. 2006. P.117. (in Russian).
  23. Igor Kotenko, Mikhail Stepashkin, Vitaly Bogdanov. Evaluation of security level of computer networks on the basis of attack graph construction. Sixth International Scientific School "Modelling and Analysis of Safety and Risk in Complex Systems" (MASR - 2006), St. Petersburg, July 4-8, 2006. P.150-154. (in Russian).
  24. Alexander Ulanov, Igor Kotenko. Research of defense mechanisms against the distributed attacks "Denial of service" on the basis of multiagent simulation. Sixth International Scientific School "Modelling and Analysis of Safety and Risk in Complex Systems" (MASR - 2006), St. Petersburg, July 4-8, 2006. P.333-339. (in Russian).
  25. Vladimir Gorodetsky, Igor Kotenko, Rafael Yusupov. Computer network security. Herald of the Russian Academy of Sciences, ¹ 7, 2006. Ń.668-670. ISSN: 0869-5873. (in Russian).
  26. Igor Kotenko, Alexander Ulanov. Multi-agent modeling of distributed "Denial of Service" attacks and defense mechanisms. Proceedings of SPIIRAS, Issue 3, Vol.1. St. Petersburg, Nauka, 2006. P.105-125. (in Russian).
  27. Igor Kotenko, Mikhail Stepashkin, Rafael Yusupov. Mathematical Models, Methods and Architectures for Computer Networks Security: the State-of-the-art Review of Perspective Directions of Research by Results of International Workshop MMM-ACNS-2005. Proceedings of SPIIRAS, Issue 3, Vol.2. St. Petersburg, Nauka, 2006. P.11-29. (in Russian).
  28. Igor Kotenko, Mikhail Stepashkin, Vitaly Bogdanov. Evaluating Security of Computer Networks based on Attack Graphs and Qualitative Security Metrics. Proceedings of SPIIRAS, Issue 3, Vol.2. St. Petersburg, Nauka, 2006. P.30-49. (in Russian).
  29. Vitaly Bogdanov, Igor Kotenko. Architecture, models and techniques of functioning of the system of proactive monitoring of security policy. Proceedings of SPIIRAS, Issue 3, Vol.2. St. Petersburg, Nauka, 2006. P.50-69. (in Russian).
  30. Artem Tishkov, Igor Kotenko, Olga Chervatuk, Dmitry Lakomov, Sergey Reznik, Ekaterina Sidelnikova. Conflict Detection and Resolution in Security Policies of Computer Networks. Proceedings of SPIIRAS, Issue 3, Vol.2. St. Petersburg, Nauka, 2006. P.102-114. (in Russian).
  31. Igor Kotenko, Artem Tishkov, Olga Chervatuk, Dmitry Lakomov. Search of conflicts in security policies. News of High schools. Instrument making, Vol.49, No. 11, 2006. (in Russian).
  32. Igor Kotenko, Alexander Ulanov. Agent-oriented environment for simulation and evaluation of "Distributed Denial of Service" defense mechanisms. News of High schools. Instrument making, Vol.49, No. 11, 2006. (in Russian).
  33. Igor Kotenko, Alexander Ulanov. Modelling and simulation of counteraction of software agents in the Internet: general approach, simulation environment and experiments. Information Security. Inside, No.4, 2006, P.44-52; No.5, 2006. P.48-56. (in Russian).
    inside-zi.4-Cover.jpg [image/jpeg] (453792 bytes)
    inside-zi.4-Paper.pdf [application/pdf] (527867 bytes)
  34. Igor Kotenko, Mikhail Stepashkin. Models of actions of hackers-malefactors realizing distributed multistage attacks. NCAI-2006. X National Conference on Artificial Intelligence with International Participation. Proceedings. Vol. 2. Moscow, Fizmatlit, 2006. P.617-625. ISBN: 5-9221-0757-7. (in Russian).
    inside-zi.5-Cover.jpg [image/jpeg] (410110 bytes)
    inside-zi.5-Paper.pdf [application/pdf] (1110624 bytes)
  35. Igor Kotenko, Alexander Ulanov. Agent-oriented simulation of complex system behavior in Internet. NCAI-2006. X National Conference on Artificial Intelligence with International Participation. Proceedings. Vol. 2. Moscow, Fizmatlit, 2006. P.660-668. ISBN: 5-9221-0757-7. (in Russian).
    NCAI-06-A-Kotenko1.pdf [application/pdf] (7392 bytes)
    NCAI-06-Kotenko1.pdf [application/pdf] (412623 bytes)
  36. Mikhail Stepashkin, Igor Kotenko, Vitaly Bogdanov. Intelligent system of computer network security analysis. NCAI-2006. X National Conference on Artificial Intelligence with International Participation. Proceedings. Vol. 1. Moscow, Fizmatlit, 2006. P.149-157. ISBN: 5-9221-0757-7. (in Russian).
    NCAI-06-A-Stepashkin.pdf [application/pdf] (7539 bytes)
    NCAI-06-Cover.jpg [image/jpeg] (261448 bytes)
    NCAI-06-Stepashkin.pdf [application/pdf] (347385 bytes)
  37. Alexander Ulanov, Igor Kotenko. Multi-agent system for simulation of computer network defense mechanisms. NCAI-2006. X National Conference on Artificial Intelligence with International Participation. Proceedings. Vol. 3. Moscow, Fizmatlit, 2006. P.867-876. ISBN: 5-9221-0757-7. (in Russian).
  38. Igor Kotenko, Mikhail Stepashkin, Vitaly Bogdanov. The models and technique of intelligent evaluation of computer networks security level. Proceedings of International Conferences "Intelligent systems (AIS'06)" and "Intelligent CAD (CAD-2006)". Moscow, Fizmatlit, 2006. P.321-328. ISBN: 5-9221-0686-4. (in Russian).
    AIS-06-A-Kotenko1.pdf [application/pdf] (7871 bytes)
    AIS-06-Cover.jpg [image/jpeg] (200919 bytes)
    AIS-06-Kotenko-paper.pdf [application/pdf] (238483 bytes)
  39. Vitaly Bogdanov, Igor Kotenko. Analysis of security policy compliance in computer networks: proactive approach. Proceedings of International Conferences "Intelligent systems (AIS'06)" and "Intelligent CAD (CAD-2006)". Moscow, Fizmatlit, 2006. P.313-320 ISBN: 5-9221-0686-4. (in Russian).
    AIS-06-A-Bogdanov.pdf [application/pdf] (7934 bytes)
    AIS-06-Bogdanov-paper.pdf [application/pdf] (246197 bytes)
  40. Igor Kotenko, Alexander Ulanov. Cooperative agent teamwork in defense from availability violation network attacks. Proceedings of International conferences "Intelligent systems (AIS'06)" and "Intelligent CAD (CAD-2006)". Moscow, Fizmatlit, 2006. P.306-313. ISBN: 5-9221-0686-4. (in Russian).
    AIS-06-A-Kotenko2.pdf [application/pdf] (7637 bytes)
    AIS-06-Kotenko-paper.pdf [application/pdf] (599294 bytes)
  41. Igor Kotenko, Alexander Ulanov. Teams of agents in cyberspace: modelling and simulation of information protection processes in the global Internet. Problems of management of information society cyber-security. Proceedings of Institute of System Analysis of Russian Academy of Science, URSS, Moscow, 2006. (in Russian).
  42. Igor Kotenko, Alexander Ulanov. Conflicts in the Internet: models of counteraction to distributed cyber attacks. The Firth All-Russian scientific Conference "Mathematics and Security of Information Technologies" (MSIT-06). Moscow, Lomonosov Moscow State University, 2006. (in Russian).
  43. Vitaly Bogdanov, Igor Kotenko, Mikhail Stepashkin. A proactive approach to security policy monitoring in computer networks. The Firth All-Russian scientific Conference "Mathematics and Security of Information Technologies" (MSIT-06). Moscow, Lomonosov Moscow State University, 2006. (in Russian).
  44. Artem Tishkov, Igor Kotenko, Ekaterina Sidelnikova, Olga Chervatuk. Detecting and fixing contradictions in security policies. The Firth All-Russian scientific Conference "Mathematics and Security of Information Technologies" (MSIT-06). Moscow, Lomonosov Moscow State University, 2006. (in Russian).
  45. Mikhail Stepashkin, Igor Kotenko, Vitaly Bogdanov. Computer network security estimation on the basis of attack graphs analysis. The Firth All-Russian scientific Conference "Mathematics and Security of Information Technologies" (MSIT-06). Moscow, Lomonosov Moscow State University, 2006. (in Russian).
  46. Igor Kotenko, Rafael Yusupov. The main directions of scientific research in the field of protection of computer networks and systems. Õ St.Petersburg International Conference "Regional Informatics-2006" (RI-2006). Proceedings. St. Petersburg, October 24-26, 2006. (in Russian).
  47. Victor Vorontsov, Igor Kotenko. Research of approaches to automatic detection and prevention of virus attacks on the basis of the combined mechanisms of network traffic restriction. Õ St.Petersburg International Conference "Regional Informatics-2006" (RI-2006). Proceedings. St. Petersburg, October 24-26, 2006. P.105-106. (in Russian).
  48. Vasily Desnitsky, Igor Kotenko. Protection of the software against breaking: the analysis of methods. Õ St.Petersburg International Conference "Regional Informatics-2006" (RI-2006). Proceedings. St. Petersburg, October 24-26, 2006. P. 108-109. (in Russian).

2005

  1. V.Gorodetsky, I.Kotenko. Conceptual Basis of Stochastic Simulation in Internet Environment // Transactions of System Analysis Institute, vol.9, Foundations of Information Technologies and Systems. URSS, Moscow, 2005, P.168-185. (in Russian).
  2. I.V.Kotenko. Multiagent models of counteracting malefactors and security systems in the Internet. Mathematics and security of information technologies. Conference proceedings. Moscow, Moscow State University, 2005, P.257-265. (in Russian).
  3. A.V.Tishkov, I.V.Kotenko. Specification and verifications of security policies of protected computer network: using Event calculus. Mathematics and security of information technologies. Conference proceedings. Moscow, Moscow State University, 2005, P.279-283. (in Russian).
  4. I.V.Kotenko. Models of counteracting the agents teams of "Distributed Denial of Service" attacks and protection against them. Intelligent systems. Collective monograph / V.M.Kureichik (ed.). Moscow, Fizmatlit, 2005. P.181-188. (in Russian).
  5. I.V.Kotenko, S.A. Nesterov. About the approach to development of functionality of network security scanners. XII All-Russian scientific conference "Problems of information security in the Higher School". MIPI, 2005. P.115-116. (in Russian).
  6. I.V.Kotenko, D.U. Mihailov. Multiagent technologies in tasks of automated monitoring the information systems of industry enterprises. Science and technologies in industry. No.1, 2005. (in Russian).
  7. I. Kotenko. Agent-Based Modeling and Simulation of Cyber-Warfare between Malefactors and Security Agents in Internet. 19th European Simulation Multiconference "Simulation in wider Europe". ESM'05. Riga, Latvia, 1-4 June 2005. P.533-543.
    ECMS2005-Cover.jpg [image/jpeg] (399631 bytes)
    ECMS2005-Paper.pdf [application/pdf] (1013528 bytes)
  8. I.Kotenko, A.Ulanov. Multiagent modeling and simulation of agents' competition for network resources availability. The Fourth International Conference on Autonomous Agents and Multi-Agent Systems. Second International Workshop on Safety and Security in Multiagent Systems (SASEMAS '05). Utrecht, The Netherlands. 2005. P. 27-43.
    SASEMAS05-Cover.jpg [image/jpeg] (372878 bytes)
    SASEMAS05-Paper.pdf [application/pdf] (452962 bytes)
  9. I.V.Kotenko, M.V.Stepashkin. Use of deception information systems for protection of information resources of computer networks. Problems of information security. Computer systems. 2005, ¹. 1, P.63-73. (in Russian).
  10. R.M.Yusupov, I.V.Kotenko. Security of computer networks and systems: a state of the art and perspective directions of scientific research. IV Inter-regional Conference "Information Security of Russia Regions" ("ISRR-2005"). June 14-16, 2005. Proceedings. St.Petersburg, 2005. P.90-91. (in Russian).
  11. A.V.Tishkov, I.V.Kotenko. Multimodular architecture of security policy verifier. IV Inter-regional Conference "Information Security of Russia Regions" ("ISRR-2005"). June 14-16, 2005. Proceedings. St.Petersburg, 2005. P.79-80. (in Russian).
  12. I.V.Kotenko, M.V.Stepashkin. Imitation models for security level evaluation of information systems at their design stage. IV Inter-regional Conference "Information Security of Russia Regions" ("ISRR-2005"). June 14-16, 2005. Proceedings. St.Petersburg, 2005. P.63-64. (in Russian).
  13. M.V.Stepashkin, I.V.Kotenko. The testbed of checking decisions on information protection in computer networks. IV Inter-regional Conference "Information Security of Russia Regions" ("ISRR-2005"). June 14-16, 2005. Proceedings. St.Petersburg, 2005. P.77-78. (in Russian).
  14. A.V.Ulanov, I.V.Kotenko. Modelling of protecting against DDOS attacks on the basis of intelligent agents' teamwork. IV Inter-regional Conference "Information Security of Russia Regions" ("ISRR-2005"). June 14-16, 2005. Proceedings. St.Petersburg, 2005. P.81-82. (in Russian).
  15. I.V.Kotenko, A.V.Ulanov. Agent-oriented modelling and simulation of information protection processes: an antagonism of agents for availability of computer networks resources. Proceedings of International Conferences "Artificial Intelligence Systems" (IEEE AIS'05)" and "Intelligent CAD" (CAD-2005). Divnomorskoe, September 3-10, 2005, Ģoscow, Fizmatlit, 2005. Vol.1. P.296-301. (in Russian).
  16. I.V.Kotenko, M.V.Stepashkin. Intelligent system for analyzing computer networks security at various stages of life cycle. Proceedings of International Conferences "Artificial Intelligence Systems" (IEEE AIS'05)" and "Intelligent CAD" (CAD-2005). Ģoscow, Fizmatlit, 2005. Vol.1. P.231-237. (in Russian).
  17. I.Kotenko, A.Ulanov. Teamwork Approach for Modeling and Simulation of DDOS attacks in Internet. 6th Workshop on Agent-Based Simulation. ABS6. Erlangen. Germany. September 12 - 15, 2005. P.28-33.
  18. I.Kotenko, M.Stepashkin. Analyzing Vulnerabilities and Measuring Security Level at Design and Exploitation Stages of Computer Network Life Cycle. Lecture Notes in Computer Science, Springer-Verlag, V.3685. The Third International Workshop "Mathematical Methods, Models and Architectures for Computer Networks Security" (MMM-ACNS-05). September 24-28, 2005, St. Petersburg, Russia. P. 317-330.
  19. A.Tishkov, I.Kotenko, E.Sidelnikova. Security Checker Architecture for Policy-based Security Management. Lecture Notes in Computer Science, Springer-Verlag, V.3685. The Third International Workshop "Mathematical Methods, Models and Architectures for Computer Networks Security" (MMM-ACNS-05). September 24-28, 2005, St. Petersburg, Russia. P. 469-474.
  20. V.S.Bogdanov, I.V.Kotenko, M.V.Stepashkin. The active security analysis of computer networks. Methods and tools of information assurance. Proceedings of ÕIV All-Russian scientific and technical conference. October 4-6, 2005. St. Petersburg, SPbSPU. 2005. P.95. (in Russian).
  21. I.V.Kotenko, A.V.Ulanov The software environment for simulation of protection mechanisms against distributed attacks "Denial of Service". Methods and tools of information assurance. Proceedings of ÕIV All-Russian scientific and technical conference. October 4-6, 2005. St. Petersburg, SPbSPU. 2005. P.96. (in Russian).
  22. M.V.Stepashkin, V.S.Bogdanov, I.V.Kotenko. Subsystem of the passive analysis of computer networks security. Methods and tools of information assurance. Proceedings of ÕIV All-Russian scientific and technical conference. October 4-6, 2005. St. Petersburg, SPbSPU. 2005. P.100. (in Russian).
  23. A.V.Tishkov, I.V.Kotenko. Verification of security policies in computer systems. Methods and tools of information assurance. Proceedings of ÕIV All-Russian scientific and technical conference. October 4-6, 2005. St. Petersburg, SPbSPU. 2005. P.101. (in Russian).
  24. M.V.Stepashkin, I.V.Kotenko, V.S.Bogdanov Imitation of attacks for the active vulnerabilities analysis of computer networks. The second All-Russian scientific-practical conference on imitation modelling and its application in science and industry "Imitation modelling. Theory and practice". IMMOD-2005. Proceedings. Vol.1. St.Petersburg, October 19-21, 2005. P.269-273. (in Russian).
  25. I.V.Kotenko, A.V.Ulanov. Multiagent environment for simulating the mechanisms of protection against distributed computer attacks. The second All-Russian scientific-practical conference on imitation modelling and its application in science and industry "Imitation modelling. Theory and practice". IMMOD-2005. Proceedings. Vol.1. St.Petersburg, October 19-21, 2005. P.220-224. (in Russian).
  26. O.V.Chervatuk, A.V.Tishkov, I.V.Kotenko Verification by model checking in the task of dynamic detection of conflicts in security policy. The second All-Russian scientific-practical conference on imitation modelling and its application in science and industry "Imitation modelling. Theory and practice". IMMOD-2005. Proceedings. Vol.1. St.Petersburg, October 19-21, 2005. P.283-287. (in Russian).
  27. I.V.Kotenko, A.V.Ulanov. Agent-based simulation of DDOS attacks and defense mechanisms. Journal of Computing, Vol. 4, Issue 2, 2005.
    Computing-05-Vol.4-Issue-2-Cover.jpg [image/jpeg] (510237 bytes)
    Computing-05-Vol.4-Issue-2-Paper.pdf [application/pdf] (583575 bytes)
  28. I.V.Kotenko, A.V.Ulanov. Software testbed and experiments for exploring counteraction of attack and defense agents in the Internet. Forth All-Russian conference "Mathematics and security of information technologies" (MaBIT-05). Moscow, Moscow State University, November 2-3, 2005. (in Russian).
  29. I.V.Kotenko, A.V.Tishkov, O.V.Chervatuk. Architecture and models for security policy verification. Forth All-Russian conference "Mathematics and security of information technologies" (MaBIT-05). Moscow, Moscow State University, November 2-3, 2005. (in Russian).
  30. V.Gorodetski, I.Kotenko, V.Skormin (Editors). Computer Network Security. Lecture Notes in Computer Science, Vol.3685, Springer Verlag, 2005.
  31. I.V.Kotenko, A.V.Ulanov. The Software Environment for multi-agent Simulation of Defense Mechanisms against DDoS Attacks. The International Conference on Intelligent Agents, Web Technologies and Internet Commerce - IAWTIC'2005. Vienna - Austria, November 28 - 30, 2005.
  32. I.V.Kotenko, A.V.Tishkov, D.P.Lakomov, O.V.Chervatuk, E.V.Sidelnikova. Checking correctness of security policies. IV Inter-regional Conference "Information Security of Russia Regions". Selected papers proceedings. St.Petersburg, 2005. (in Russian).
  33. I.V.Kotenko, M.V.Stepashkin, V.S.Bogdanov. Model of attacks for imitating malefactor's actions in security analysis system for computer networks. IV Inter-regional Conference "Information Security of Russia Regions". Selected papers proceedings. St.Petersburg, 2005. (in Russian).
  34. I.V.Kotenko, R.M.Yusupov. Computer security: the perspective directions of SPIIRAS research. IV Inter-regional Conference "Information Security of Russia Regions". Selected papers proceedings. St.Petersburg, 2005. (in Russian).
  35. I. Kotenko. Multi-agent modeling and simulation of computer network security processes: "a game of network cats and mice". NATO Advanced Study Institute (ASI). "Network Security and Intrusion Detection". October 1-12, 2005. Nork, Yerevan, Armenia, IOS Press. 2005.

2004

  1. I.V. Kotenko. Multiagent technologies of vulnerability assessment and intrusion detection in computer networks. Confident, ¹ 2, P.72-76; ¹ 3, P.78-82. 2004. (in Russian).
    Confident-2-2004-Cover.jpg [image/jpeg] (203883 bytes)
    Confident-2-2004-Paper.pdf [application/pdf] (536500 bytes)
    Confident-3-2004-Cover.jpg [image/jpeg] (196652 bytes)
    Confident-3-2004-Paper.pdf [application/pdf] (488448 bytes)
  2. I.V. Kotenko. Theoretical aspects of developing deception systems. III Inter-regional Conference "Information Security of Russia Regions". Proceedings. St.Petersburg. 2004. P.59-68. (in Russian).
  3. I.V.Kotenko, M.V. Stepashkin. The prototype of deception system simulator: architecture and scripts of carrying out of experiments. III Inter-regional Conference "Information Security of Russia Regions". Proceedings. St.Petersburg. 2004. P.68-73. (in Russian).
  4. A.V.Ulanov, I.V.Kotenko. Modeling attack "Distributed Denial of Service" by an example of using virus Mydoom. IX International Conference "Regional informatics-2004", St. Petersburg, Proceedings. SPb., 2004. P.155-156. (in Russian).
  5. M.V.Stepashkin, I.V. Kotenko Analysis of attributes of network connections and operational system logs for intrusion detection. IX International Conference "Regional informatics-2004", St. Petersburg, Proceedings. SPb., 2004. P.152-153. (in Russian).
  6. I.V.Kotenko, M.V. Stepashkin. Monitoring of users work in computer networks. IX International Conference "Regional informatics-2004", St. Petersburg, Proceedings. SPb., 2004. P.136-137. (in Russian).
  7. I.V.Kotenko, M.V.Stepashkin Deception systems for protection of information resources in computer networks. Proceedings of SPIIRAS, Issue 2. SPb., SPIIRAS, 2004 (in Russian).
  8. V.Gorodetski, O.Karsayev, I.Kotenko, V.Samoilov. Multi-Agent Information Fusion: Methodology, Architecture and Software Tool for Learning of Object and Situation Assessment. The 7th International Conference on Information Fusion. Proceedings. Stockholm, Sweden. June 28 - July 1, 2004.
    fusion-04-paper.pdf [application/pdf] (451039 bytes)
  9. P.Laskov, C.Schafer, I.Kotenko. Intrusion detection in unlabeled data with one-class Support Vector Machines. Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2004), Lecture Notes in Informatics (LNI), No. 46, Dortmund, Germany, July 2004. P.71-82.
    DIMVA-04-Cover.jpg [image/jpeg] (781850 bytes)
    DIMVA-04-paper.pdf [application/pdf] (215790 bytes)
  10. I.V.Kotenko, M.V. Stepashkin. Intelligent deception systems for information security in computer networks. Proceedings of International Conferences "Artificial Intelligence Systems" (IEEE AIS'04)" and "Intelligent CAD" (CAD-2004). Divnomorskoe, September 3-10, 2004. P.204-209. (in Russian).
  11. I.V. Kotenko Recognition of agents-hackers plans at detecting computer attacks. Proceedings of International Conferences "Artificial Intelligence Systems" (IEEE AIS'04)" and "Intelligent CAD" (CAD-2004). Divnomorskoe, September 3-10, 2004. P.198-204. (in Russian).
  12. I.Kotenko, A.Tishkov, M.Tishkova The event calculus implementation using ILOG JRules for security policy verification. 9-th International Workshop SPEECH AND COMPUTER (SPECOM'2004) 20-22 September 2004, St. Petersburg, Russia. 2004. P.630-633.
  13. I.V.Kotenko Mutiagent technologies of vulnerability assessment and intrusion detection in computer networks. AI News, ¹ 1, 2004. P.56-72. (in Russian).
  14. I.V. Kotenko. Modeling and Simulation of Attacks for Verification of Security Policy and Vulnerability Assessment. Seventh International Symposium on Recent Advances in Intrusion Detection. RAID 2004. Abstract and Poster sessions. Sophia-Antipolis, French Riviera, France, September 15-17, 2004.
  15. I.V. Kotenko Mutiagent modeling of attack "Distributed Denial of Service". IX National Conference on Artificial Intelligence with international participation. Proceedings. Vol.2. Ģoscow: Fizmatlit, 2004. P.723-731. (in Russian).
  16. V.Gorodetsky, I.Kotenko. Scenarios Knowledge base: A Formal Framework for Proactive Coordination of Coalition Operations. Knowledge Systems for Coalition Operation. M.Pechoucek, A.Tate (eds.). Third International Conference on Knowledge Systems for Coalition Operations (KSCO-2004). Pensacola, Florida. 2004. P.83-97.
    KSCO-04-Cover.jpg [image/jpeg] (142459 bytes)
    KSCO-04-Paper.pdf [application/pdf] (278320 bytes)
  17. A.V.Tishkov, I.V.Kotenko System of security policies verification in protected computer networks. Proceedings of ÕI Russian Conference "Methods and tools of information assurance". St. Petersburg, SPbSPU. October 4-5, 2004. P.129. (in Russian).
  18. I.V.Kotenko, M.V.Stepashkin, D.U.Mihailov. System of collection, analysis and storage of data for users work audit. Proceedings of ÕI Russian Conference "Methods and tools of information assurance". St. Petersburg, SPbSPU. October 4-5, 2004. P.124. (in Russian).
  19. I.V.Kotenko, M.V.Stepashkin Recognition of goals and plans of malefactors at detecting computer attacks. Proceedings of ÕI Russian Conference "Methods and tools of information assurance". St. Petersburg, SPbSPU. October 4-5, 2004. P.97. (in Russian).
  20. A.V.Ulanov, I.V.Kotenko Models of DDoS-attacks and mechanisms of protection against them. Proceedings of ÕI Russian Conference "Methods and tools of information assurance". St. Petersburg, SPbSPU. October 4-5, 2004. P.106. (in Russian).
  21. I.V.Kotenko Multiagent models of counteracting malefactors and security systems in Internet. Third All-Russian Conference "Mathematics and security of information technologies". Moscow, Moscow State University, 2004. (in Russian).
  22. I.V.Kotenko, A.V.Tishkov Event calculus for specification and verifications of security policies of protected computer network. Third All-Russian Conference "Mathematics and security of information technologies". Moscow, Moscow State University, 2004. (in Russian).
  23. P.Laskov, C.Schafer, I.Kotenko, K.-R.Muller Intrusion detection in unlabeled data with quarter-sphere Support Vector Machines. PIK-Heft. Germany. 2004.
  24. I.V. Kotenko. Modeling cyber war: models of teams of attack and protection agents acting in Internet. Applied intelligent systems. Ģoscow, Fizmatlit, 2004 (in Russian).

2003

  1. V.Gorodetsky, I.Kotenko, O.Karsaev. Multi-agent Technologies for Computer Network Security: Attack Simulation, Intrusion Detection and Intrusion Detection Learning. International Journal of Computer Systems Science and Engineering. vol.18, No.4, July 2003, P.191-200.
    ICSSE-2003-paper.pdf [application/pdf] (1871467 bytes)
  2. I.Kotenko. Multi-agent technologies of active vulnerabilities analysis and intrusion detection for creating secure distributed computer systems. Proceedings of International Congress "Trust and č safety in informational society", St. Petersburg, April 21-22, 2003. (in Russian).
  3. I. Kotenko, E. Man'kov. Agent-Based Modeling and Simulation of Computer Network Attacks. Proceedings of Fourth International Workshop "Agent-Based Simulation 4 (ABS 4)". Jean-Pierre Muller, Martina-M.Seidel (Editors). April 28-3. Montpellier, France, 2003, P.121-126.
  4. I. Kotenko. Teamwork of Hackers-Agents: Modeling and Simulation of Coordinated Distributed Attacks on Computer Networks. Proceedings of the 3rd International/Central and Eastern European Conference on Multi-Agent Systems (CEEMAS 2003). Prague, Czech Republic. June 16 - 18, 2003. "Multi-Agent Systems and Applications III". V.Marik, J.Muller, M.Pechoucek (Editors), Lecture Notes in Artificial Intelligence, Springer-Verlag, vol.2691, P.464-474.
  5. V.I.Gorodetsky, I.V.Kotenko, J.B.Michael. Multi-agent Modeling and Simulation of Distributed Denial of Service Attacks on Computer Networks. Proceedings of Third International Conference "NAVY AND SHIPBUILDING NOWADAYS" (NSN'2003). St. Petersburg, Russia, June 26 - 28, 2003, P.38-47.
  6. A.Alexeev, I.Kotenko. Teamwork of agents protecting from distributed attacks "Denial of service". Proceedings of International Conference on Soft Computing and Measurements (SMC'2003). St-Petersburg, Russia. June 25 - 27, 2003, P.294-297. (in Russian).
  7. I.Kotenko, M.Stepashkin. Intelligent system for simulating attacks on Web-server for computer systems vulnerabilities analysis. Proceedings of International Conference on Soft Computing and Measurements (SMC'2003). St. Petersburg, Russia, June 25 - 27, 2003, P.298-301. (in Russian).
  8. I.Kotenko, L.Stankevich. Real-time Teamwork of Agents. AI News, ¹ 3, 2003. P.25-31. (in Russian).
  9. I.Kotenko. Models of Opposition of Agents Teams in realizing of and protecting from distributed attacks "Denial of service". Proceedings of International Conferences "Artificial Intelligence Systems" (IEEE AIS'03)" and "Intelligent CAD" (CAD-2003). Divnomorskoe, September 3-10, 2003. Vol.1. P.422-428. (in Russian).
  10. S.Nesterov, I.Kotenko. Risk analysis of computer systems on the basis of using network attack simulator. Proceedings of the VIII International Conference "Regional informatics-2002", St. Petersburg, 2003. P.185-189. (in Russian).
  11. I.Kotenko, A.Alexeev. Modeling of DDoS-attacks on the basis of agents' teamwork. Proceedings of the VIII International Conference "Regional informatics-2002". St. Petersburg, 2003. P.180-184. (in Russian).
  12. I.Kotenko, S.Nesterov. Information assurance systems design by integrating the procedures of risk analysis and active security audit. International Conference "Modeling and Analysis of Safety and Risk in Complex Systems" (MA SR - 2003). St. Petersburg, August 20-23, 2003. P.396-402. (in Russian).
  13. I.Kotenko, E.Man'kov. Experiments with simulation of attacks against computer networks. Lecture Notes in Computer Science, Springer-Verlag, Vol.2776. Theory and Practice of Computer Network Security. Proceedings of the International Workshop on Mathematical Methods, Models and Architectures for Computer Network Security, St. Petersburg, Russia, September 21-23, 2003, P.187-198.
  14. I.Kotenko, A.Alexeev, E.Man'kov. Formal Framework for Modeling and Simulation of DDoS Attacks Based on Teamwork of Hackers-Agent. Proceedings of 2003 IEEE/WIC International Conference on Intelligent Agent Technology, Halifax, Canada, October 13-16, 2003, IEEE Computer Society. 2003, P.507-510.
  15. I.Kotenko. Active Assessment of Computer Networks Vulnerability by Simulation of Complex Remote Attacks. Proceedings of 2003 International Conference on Computer Networks and Mobile Computing (ICCNMC-03). Shanghai, China, October 20-23, 2003. IEEE Computer Society, 2003, P.40-47.
  16. V.Gorodetsky, O.Karsaev, I.Kotenko, V.Samoilov, M.Stepashkin. Multi-agent system of intrusion detection learning. Proceedings of III Inter-regional Conference "Information Security of Russia Regions", Vol.1. St. Petersburg, November 25-27, 2003. (in Russian).
  17. D.Komashinski, I.Kotenko. Multi-agent technology for modeling of virus expansion within Internet. Proceedings of the III Inter-regional Conference "Information Security of Russia Regions", Vol.1. St. Petersburg, November 25-27, 2003. (in Russian).
  18. I.Kotenko. Modeling of cyber war on the basis of agents' technologies. Proceedings of III Inter-regional Conference "Information Security of Russia Regions", Vol.1. St. Petersburg, November 25-27, 2003. (in Russian).
  19. A.Alexeev, I.Kotenko. Multi-agent system of DDOS-attacks simulation. Proceedings of ÕI Russian Conference "Methods and tools of information assurance". St. Petersburg, SPbSPU, November 26-27, 2003. (in Russian).
  20. I.Kotenko, M.Stepashkin. Prototype of honeypot system. Proceedings of ÕI Russian Conference "Methods and tools of information assurance". St. Petersburg, SPbSPU,. November 26-27, 2003. (in Russian).
  21. I.Kotenko, E.Man'kov. Stochastic model of attacks on computer networks based on state machines. Informatization and communication, ¹ 1-2, 2003. P.61-67. (in Russian).
  22. I.Kotenko, V.Gorodetski. Multi-agent Systems for Intrusion Detection. Proceedings of China-Russia Bilateral Conference on Intelligent Information Processing (CRBCIIP-2003), October 19-23, 2003, Shanghai, China. P.9-17.
  23. I.Kotenko. Multi-agent Modeling and Simulation of Computer Network Attacks based on Teamwork Models and Formal Grammars. Proceedings of China-Russia Bilateral Conference on Intelligent Information Processing (CRBCIIP-2003), October 19-23, 2003, Shanghai, China. P.18-29.

2002

  1. V. Gorodetski, O.Karsayev, I.Kotenko, A.Khabalov. Software Development Kit for Multi-agent Systems Design and Implementation. Lecture Notes in Artificial Intelligence, Vol.2296, Springer Verlag, 2002. P.121-130.
  2. V.Gorodetski, I.Kotenko. Formal Model of complex distributed attacks on Computer Networks. II Inter-regional Conference "Information Security of Russia Regions". Proceedings. Vol.2. Saint-Petersburg, 2002. P.92-97. (in Russian).
  3. V.I.Gorodetski, I.V.Kotenko. Teamwork of Agents in Antagonistic Environment. International Conference on Soft Computing and Measurements. SMC'2002. Proceedings. Saint-Petersburg, 2002. Vol.1. P.259-262. (in Russian).
  4. I.V.Kotenko, O.V.Karsayev, V.V.Samoilov. Ontology of learning for Intrusion Detection in Computer Networks. International Conference on Soft Computing and Measurements. SMC'2002. Proceedings. Saint-Petersburg, 2002. Vol.1. P. 255-258. (in Russian).
  5. V.I.Gorodetski, I.V.Kotenko. The Multi-agent Systems for Computer Network Security Assurance: frameworks and case studies. IEEE ICAIS-02. IEEE International Conference on Artificial Intelligence Systems. Proceedings. 2002. P. 297-302.
    ICAIS-02-paper.pdf [application/pdf] (177148 bytes)
  6. I.V.Kotenko, L.A.Stankevich. The Control of Teams of Autonomous Objects in the Time-Constrained Environments. IEEE ICAIS-02. IEEE International Conference on Artificial Intelligence Systems. Proceedings. 2002. P.121-130.
  7. I.Kotenko, E.Man'kov. Simulation of Attacks on Telecommunication Systems. VIII International Conference on Informational Networks, Systems and Technologies. ICINSAT-2002. SUT. St.Petersburg, 2002. P.190-198. (in Russian).
  8. I.V.Kotenko. Multi-agent Technologies for Support of Intrusion Detection in Computer Networks. Russian Conference "Methods and tools of information assurance". Proceedings. Saint-Petersburg - Pushkin, 2002. (in Russian).
  9. V.V.Gorodetski, I.V.Kotenko. Teamwork of Hackers-Agents: Application of Multiagent Technology for Simulation of Distributed Attacks on Computer Networks. VIII National conference with international involvement on Artificial Intelligence Proceedings. Moscow, 2002. (in Russian).
  10. I.V.Kotenko, N.A.Lihvanzev. The Technology of Expert Critics for Intelligent Support of Decision Making. CAI-2002. VIII National conference with international involvement on Artificial Intelligence Proceedings. Moscow, 2002. P.565-574. (in Russian).
  11. I.V.Kotenko, L.A.Stankevich . Agents' Teamwork in Conditions of Time Constraints. Third International Conference "Artificial Intelligence -2002". Proceedings . 2002. Crimea, Ukraine, 2002. (in Russian).
  12. I.Kotenko.Case-based Recovering of Formal Grammars specifying Scenarios of Computer Attacks. Third International Conference "Artificial Intelligence -2002". Proceedings. 2002. Crimea, Ukraine, 2002. (in Russian).
  13. V.Gorodetski, I.Kotenko. Attacks against Computer Network: Formal Grammar-based Framework and Simulation Tool. Lecture Notes in Computer Science, V.2516. Recent Advances in Intrusion Detection. A.Wespi, G.Vigna, L.Deri (Eds.). Fifth International Symposium. RAID 2002. Zurich, Switzerland. October 2002. Proceedings. P.219-238.
    RAID-02-paper.pdf [application/pdf] (137246 bytes)
  14. I.Kotenko. Taxonomies of attacks on computer systems. SPIIRAS Proceeding, Vol.1. SPb, SPIIRAS, 2002. P.196-211. (in Russian).

2001

  1. I.Kotenko, O.Karsayev. Application of Multi-agent Technology for Integrated Assurance of Computer Networks. Transactions of Taganrog Radio-Technical University, No 4, 2001. P.38-50. (in Russian).
  2. I.Kotenko, N.Lihvanzev. Multi-agent Technology of Expert Critics for Intelligent Decision Support. Transactions of Taganrog Radio-Technical University, No.4, 2001. P.17-25. (in Russian).
  3. V.Gorodetski, I.Kotenko. Models of Attacks on Computer Networks based on Formal Grammars. International Conference on Soft Computing and Measurements. SMC'2001. Proceedings. Saint-Petersburg, 2001. Vol.1. P.212-216. (in Russian).
  4. N.Lihvanzev, I.Kotenko. Model of Self-adaptation of Expert Critics Components based on Probabilistic State Machines. International Conference on Soft Computing and Measurements. SMC'2001. Proceedings. Saint-Petersburg, 2001. Vol.1. P.131-136. (in Russian).
  5. V.Gorodetski, O.Karsayev, A.Khabalov, I.Kotenko. Program prototype of the Multi-Agent Computer Network Intrusion Detection System. CAI'2001. International Congress "Artificial Intelligence in XXI Century". Proceedings. Vol.1. 2001. P.280-293. (in Russian).
  6. V.Gorodetski, O.Karsayev, I.Kotenko, A.Khabalov. MAS DK: Software Development Kit for Multi-agent Systems Implementation and Examples of Applications. ICAI'2001. International Congress "Artificial Intelligence in XXI Century". Proceedings. Vol.1. 2001. P.249-262. (in Russian).
  7. V.Gorodetski, O.Karsayev, A.Khabalov, I.Kotenko, L.Popyack, V.Skormin. Agent-based Model of Computer Network Security System: A Case Study. Lecture Notes in Computer Science, V.2052. Information Assurance in Computer Networks. Methods, Models, and Architectures for Network Security. International Workshop MMM-ACNS 2001. St.Petersburg, Russia, May 2001. Proceedings. P.39-50.
  8. V.Gorodetski, O.Karsayev, I.Kotenko, A.Khabalov. Software Development Kit for Multi-agent Systems Design and Implementation. Proceedings of the Second International Workshop of Central and Eastern Europe on Multi-agent Systems. CEEMAS'01. Krakow, Poland, September26-29, 2001. B.Dunin-Keplicz, E.Nawarecki (Eds.). 2001. P.99-108.
  9. V.Gorodetski, O.Karsayev, I.Kotenko . Multi-agent System of Intrusion Detection into Computer Networks. II Inter-regional Conference "Information Security of Russia Regions " . Proceedings. Vol.1. Saint-Petersburg, 2001. P.56. (in Russian).
  10. V.Gorodetski, I.Kotenko, E,Man'kov. Modeling of distributed Attacks on Computer Networks. II Inter-regional Conference "Information Security of Russia Regions " . Proceedings. Vol.1. Saint-Petersburg, 2001. P.56-57. (in Russian).

2000

  1. V.Gorodetski, I.Kotenko, L.Popyack, V.Skormin. Integrated Multi-Agent Information Security System: Mechanisms of Agents' Operation and Learning. Proceedings of the Fifth International Conference on the Practical Application of Intelligent Agents and Multi-Agent Technology. PAAM' 2000. PA EXPO 2000. Manchester. UK. Practical Application Company Ltd. 2000. P.151-154.
  2. V.Gorodetski, I.Kotenko, O.Karsaev. Framework for Ontology-based Representation of Distributed Knowledge in Multiagent Network Security System. Proceedings of the 4th World Multi-conference on Systems, Cybernetics and Informatics (SCI-2000), Vol. III: "Virtual Engineering and Emergent Computing". Orlando, USA, July 2000. P.52-58.
  3. V.Gorodetski, I.Kotenko, V.Skormin. Integrated Multi-Agent Approach to Network Security Assurance: Models of Agents' Community. Information Security for Global Information Infrastructures. IFIP TC11 Sixteenth Annual Working Conference on Information Security. Ed. by S.Qing, J.H.P.Eloff. Beijing, China, August 21-25, 2000. P.291-300.
  4. V.Gorodetski, I.Kotenko, O.Karsaev. Multi-Agent Information Security System in Computer Networks: Mechanisms of Learning and Decision Making for Intrusion Detection. Inter-regional Conference "Information Security of Russia Regions". Proceedings. Saint-Petersburg, 2000. P.97-104. (in Russian).
  5. V.Gorodetski, I.Kotenko, O.Karsaev. Multi-agent Network Security System: Mechanisms of Learning and Decision Making for Intrusion Detection. "Problemy Informatizatsiy", No.2, 2000. P.67-73. (in Russian).
  6. I. Kotenko. Models and algorithms of the guaranteed time support for problem solving by knowledge-based systems. International Conference on Soft Computing and Measurements. SMC'2000. Proceedings. Saint-Petersburg, 2000. P.254-257. (in Russian).
  7. I.Kotenko, V.Golodnov, N.Lihvanzev, M.Zabadani. New Information Technologies for Decision Support Systems in design and Planning of Telecommunication Systems. VI International Conference on Informational Networks and Systems. ISINAS-2000. LONIIS, SUT. St.Petersburg, 2000. P.135-146. (in Russian).
  8. V.Gorodetski, I.Kotenko, O.Karsaev, A.Khabalov. Multi-agent Technologies of Integrated Assurance in Telecommunication Networks. VI International Conference on Informational Networks and Systems. ISINAS-2000. LONIIS, SUT. St.Petersburg, 2000. P.122-134. (in Russian).
  9. V.Gorodetski, I.Kotenko, O.Karsaev. Intelligent Agents for Attack Detection in Computer Networks. CAI'2000. VII National conference with international involvement on Artificial Intelligence Proceedings. Moscow, 2000. P.771-779. (in Russian).

1999

  1. Kotenko I.V. Uncertainty Processing for Monitoring Large-Scaled Distributed Systems // Ģåęäóķąšīäķą˙ źīķōåšåķöč˙ ļī ģ˙ćźčģ āū÷čńėåķč˙ģ č čēģåšåķč˙ģ. SMC - 99. Ńįīšķčź äīźėąäīā. ŃĻį: ŃĻįĆŻŅÓ, 1999, Vol.1, P.89-93.
  2. Kotenko I.V. Application of Hybrid Agent-Based Technology for Design of Telecommunication Systems // Proceedings of the First International Workshop of Central and Eastern Europe on Multi-agent Systems. CEEMAS'99. St. Petersburg. 1999. P.139-153.
  3. Gorodetski V., Kotenko I., Popyack L., Skormin V. Agent-based Model of Information Security System: Architecture and Formal Framework for Coordinated Behavior Specification // Proceedings of the First International Workshop of Central and Eastern Europe on Multi-agent Systems. CEEMAS'99. St. Petersburg. 1999. P.113-123.
  4. Gorodetski V., Popyack L., Kotenko I., Skormin V. Ontology-Based Multi-Agent Model of an Information Security System // Lecture Notes in Artificial Intelligence, V.1711. New Directions in Rough Sets, Data Mining, and Granular-Soft Computing. 7th International Workshop, RSFDGrC'99. Yamaguchi, Japan. November 1999. Proceedings. P.528-532.
  5. Gorodetski V., Skormin V., Popyack L., Kotenko I. Multi-Agent Integrated Information Security System for Computer Networks: Architecture and Agent Interaction // Proceedings of the Second International Scientific Conference in the Republic of Kazakhstan on Informative Technologies and Control (KazITC'99). December 6-10, 1999. Almaty, Kazakhstan. P.286-305.

Top 

RUSSIA, 199178, Saint-Petersburg, liniya 14-ya, 39, SPIIRAS (metro station Vasileostrovskaya).
+7-(812)-328-7181, +7-(812)-328-2642, ivkote[AT]comsec[DOT]spb[DOT]ru

Comments? Questions? chechulin[AT]comsec[DOT]spb[DOT]ru

Locations of visitors to this page