| News | Staff | Projects | Awards | Patents | Results | Conferences | Collaboration | ISL ISoCPS | Publications | Events | Matherials |
 | Links | Contacts |
rus | eng |
  


Personal | Interests |  Courses | Activities |  Awards | Projects | Publications | 

Novikova Evgenia Sergeevna

Citizenship: Russia
Address academic (office):
St.Petersburg Federal Research Ceneter of the Russian Academy of Sciences
39, 14th Liniya, St.-Petersburg, 199178, Russia
Tel.: +7-(812)-328-2642
Fax: +7-(812)-328-4450
E-mail: novikova@comsec.spb.ru

Evgeniia Novikova, senior researcher of Laboratory of Computer Security Problems of the St.Petersburg Federal Research Ceneter of the Russian Academy of Sciences. Graduated with honors from St. Petersburg State Electrotechnical University "LETI" (2007), speciality "Computer Security", received her Ph.D. degree in 2009, speciality "Information Security Methods and Systems, Information Security" (05.13.19).
Main publications are related to the areas of information authentication and protection, digital signature schemes, security visualisation. Author of more than 50 publications, including textbooks.

E-mail: novikova[AT]comsec[DOT]spb[DOT]ru
http://comsec.spb.ru/novikova/

Top 

Research interests

  • Computer network security, including authentication protocols, digital signature schemes, security visualisation

Top 

Courses Taught

The following courses are conducted at the St.Petersburg State Electrotechnical University "LETI":
  • Computer virology and information system intrusion methods ,
  • Data structures and data processing algorithms ,
  • Theory of the cryptography.

Top 

Professional activities

  1. Co-author of several Russian patents.
  2. Serving as PC member of International and Russian conferences: 2012
    • International conference "Mathematical Methods, Models and Architectures for Computer Network Security 2012" (MMM-ACNS-2012). St. Petersburg, Russia. September 11-13, 2012. http://comsec.spb.ru/mmm-acns12/ (PC member).

Top 

Awards

2012

  • Novikova Evgenia Sergeevna - Winner of the competitive selection process for the provision of the 2012 grants to young scientists, young PhD of universities, industry and academic institutions located in St. Petersburg.

2009

  • Novikova Evgenia Sergeevna - Fellowship of the President of Russian Federation for PhD.

2008

  • Novikova Evgenia Sergeevna - The winner of Saint-Petersburg grants for young scientists (Diploma 080157).

Top 

Patents and Programms

Programs and databases

2020

  1. Evgenia Novikova, Vasily Desnitsky Component for the multidimensional data from wireless sensor network visualization. Certificate No. 2020666210. Registered in the Computer Program Registry 07.12.2020.

2013

  1. Evgenia Novikova, Igor Kotenko. System for visualization of logs of mobile money transfer service. Federal Service for Intellectual Property. Certificate No 2013660999. Registered in the Computer Program Registry 26.11.2013 .

Top 

Projects

Former Projects

  • Vasiliy Desnitsky (Principal Investigator). Models, techniques and algorithms for security analysis of software and hardware components of wireless sensor networks. Research grant # 19-07-00953 A of Russian Foundation of Basic Research, 2019-2021 (Researcher).
    Report-2019-19-07-00953-a-short.pdf [application/pdf] (195496 bytes)
    Report-2020-19-07-00953-a-short.pdf [application/pdf] (201695 bytes)
    Report-2021-19-07-00953-a-short.pdf [application/pdf ] (205488 bytes)
  • Igor Kotenko (Principal Investigator) State Contract No. 05.607.21.0322 "Development of methods, models, algorithms and software tools based on detecting deviations in heuristics of ultra-high volume traffic to detect network attacks and protect against them". Project of Russian Ministry of Education and Science in scope of the Program "Research and development in priority directions of evolution of the scientific and technological complex of Russia on 2014-2020", 2019-2020 (Researcher).
    Report-FTP-Results-05.607.21.0322.pdf [application/pdf] (204912 bytes)
  • Vasiliy Desnitsky (Principal Investigator). Development and investigation of models and techniques for design and verification of combined protection mechanisms for information and telecommunication systems with embedded devices on the base of expert knowledge. Research grant # 14-07-00417-a of Russian Foundation of Basic Research, 2014-2016 (Researcher).
    Report-2014-14-07-00417-a-short.pdf [application/pdf] (258333 bytes)
    Report-2015-14-07-00417-a-short.pdf [application/pdf] (516620 bytes)
    Report-2016-14-07-00417-a-short.pdf [application/pdf] (740843 bytes)
  • Igor Saenko (Principal Investigator). Models and methods of access to resources in a unified information and communication space of heterogeneous systems based on artificial intelligence technology. Research grant # 14-07-00697-a of Russian Foundation of Basic Research, 2014-2016 (Researcher).
    Report-2014-14-07-00697-a-short.pdf [application/pdf] (303104 bytes)
    Report-2015-14-07-00697-a-short.pdf [application/pdf] (395000 bytes)
    Report-2016-14-07-00697-a-short.pdf [application/pdf] (614957 bytes)
  • ENGENSEC
    Igor Kotenko (Principal Investigator from SPIIRAS). Educating the Next generation experts in Cyber Security: the new EU-recognized Masters program. Research Project of the European Community program TEMPUS 544455-TEMPUS-1-2013-1-SE-TEMPUS-JPCR (http://engensec.eu/), 2014-2016 (Researcher).
  • Igor Kotenko (Principal Investigator). Methods for the synthesis of the distributed intelligent system of information and technological security of automated control systems for railways. Research grant # 13-07-13159-ofi_m_RJD of Russian Foundation of Basic Research, 2013-2014 (Researcher).
  • Novikova E.S. (Principal Investigator). Techniques for Security Enforcement of the Authentication Algorithms and Digital Signature Schemes Used in eDocument Flow. Research Grant 12-07-31164-_, 2012-2013 (Principal Investigator).
    Report 12-07-31164 2012.pdf [application/pdf] (174674 bytes)
    Report 12-07-31164 2013.pdf [application/pdf] (304058 bytes)
  • Igor Kotenko (Principal Investigator). State Contract No. 11.519.11.4008 Research and development of methods, models and algorithms of intellectualizing the secirity services in critical infrastructures. Project of Russian Ministry of Education and Science, 2011-2013 (Researcher).
  • Igor Kotenko (Principal Investigator from SPIIRAS). MAnagement of Security information and events in Service InFrastructures (MASSIF). Research Project of the European Community seventh framework program (FP7). Contract No. 257475 (http://www.massif-project.eu/), 2010-2013 (Researcher).

Top 

Main publications

Books and Chapters in Books

  1. Igor Kotenko, Igor Saenko, Andrey Chechulin, Olga Polubelova, Evgenia Novikova, Elena Doinikova, Andrey Shorov, Vasily Desnitsky. Intelligent information security services in critical infrastructures. Monography / Ed. Igor Kotenko and Igor Sayenko. St. Petersburg: BHV Publishing House, 2019. ISBN 978-5-9775-3968-5 https://www.elibrary.ru/item.asp?id=42927796 eLIBRARY ID: 42927796

Papers

2022

  1. Evgenia Novikova, Diana Gaifulina, Elena Doynikova, Igor Kotenko. Construction and Analysis of Integral User-Oriented Trustworthiness Metrics // Electronics 2022, 11(2), 234. https://doi.org/10.3390/electronics11020234 https://www.mdpi.com/journal/electronics (WoS Q3, Scopus Q2, , ) file:///C:/Users/79291/Downloads/electronics-11-00234.pdf
  2. Elena Doynikova, Evgenia Novikova, Ivan Murenin, Maxim Kolomeec, Diana Gaifulina, Olga Tushkanova, Dmitry Levshun, Alexey Meleshko, Igor Kotenko. Security Measuring System for IoT Devices // Proceedings of the 4th International Workshop on Attacks and Defenses for Internet-of-Things (ADIoT 2021). LNCS, Vol. 13106, 2021 // In book: Computer Security. ESORICS 2021 International Workshops. pp.256-275 DOI:10.1007/978-3-030-95484-0_16

2021

  1. Doynikova Elena, Novikova Evgenia, Gaifulina Diana, Kotenko Igor. Towards Attacker Attribution for Risk Analysis // 15th International Conference on Risks and Security of Internet and Systems. 14-18 September 2020, Surrey, UK // Lecture Notes in Computer Science (LNCS), Springer. 2020.Vol. 12528, pp. 347-353 // DOI:10.1007/978-3-030-68887-5_22 (WoS, Scopus) eLIBRARY ID: 46756437
  2. Tsarenko Olga, Bekeneva Yana, Novikova Evgenia. Analysis of the Messages from Social Network for Emergency Cases Detection //In book: Congress on Intelligent Systems pp.35-47 (Scopus) DOI:10.1007/978-981-33-6984-9_4
  3. I. Kholod, E. Yanaki, D. Fomichev, E. Shalugin, Eugenia Novikova, E. Filippov, M. Nordlund. Open-source federated learning frameworks for IOT: a comparative review and analysis // Sensors. 2021. . 21. 1. . 1-22. DOI: 10.3390/s21010167 eLIBRARY ID: 45041108
  4. Violetta Kiseleva, Eugenia Novikova. Designing a control panel for monitoring the state of a complex object based on a nested design model of data visualization // Izvestiya SPbGETU LETI. 2021. No. 7. pp. 43-49. eLIBRARY ID: 46566750 (in Russian).
  5. Alexey Meleshko, Vasily Desnitsky, Igor Kotenko, Eugenia Novikova, A. Shulepov. Combined approach to anomaly detection in wireless sensor networks on example of water management system // : 2021 10th Mediterranean Conference on Embedded Computing, MECO 2021. 10. 2021. . 9460237. DOI: 10.1109/MECO52532.2021.9460237 eLIBRARY ID: 47060214
  6. A. Shulepov, Eugenia Novikova, M. Bestuzhev. Approach to compare point distribution patterns produced by dimension reduction techniques // : Proceedings of the 2021 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering, ElConRus 2021. 2021. . 678-681
  7. M. Kuznetzov, Eugenia Novikova. Towards application of text mining techniques to the analysis of the privacy policies // : 2021 10th Mediterranean Conference on Embedded Computing, MECO 2021. 10. 2021. . 9460130. DOI: 10.1109/MECO52532.2021.9460130 eLIBRARY ID: 47038887
  8. Roman Ushakov, Elena Doynikova, Evgenia Novikova, Igor Kotenko. CPE and CVE based Technique for Software Security Risk Assessment // : Proceedings of the 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, IDAACS 2021. 22-25 September, 2021, Cracow, Poland. pp.353-356 (WoS, Scopus, , ) DOI:10.1109/IDAACS53288.2021.9660968 eLIBRARY ID: 48134070
  9. Elena Doynikova, Andrey Fedorchenko, Igor Kotenko, Eugenia Novikova. Methodology for assessing security based on the semantic model of metrics and data // Questions of cybersecurity. 2021. No. 1 (41). pp. 29-40. DOI: 10.21681/2311-3456-2021-1-29-40. eLIBRARY ID: 44833771 (in Russian).
  10. Elena Fedorchenko, Eugenia Novikova, Diana Gayfullina, Igor Kotenko. Attacker profiling based on the network traffic analysis // Control systems, communications and security. 2021. No. 6. pp. 76-89. DOI: 10.24412/2410-9916-2021-6-76-89 eLIBRARY ID: 47416445 (in Russian).
  11. Alexey Meleshko, Anton Shulepov, Vasily Desnitsky, Eugenia Novikova. Integrated approach to revelation of anomalies in wireless sensor networks for water control cases // Computer tools in education. 2021. No. 1. pp. 58-67. DOI: 10.32603/2071-2340-2021-1-59-68 eLibrary ID: 47143926 (in Russian).
  12. Michael Kuznetsov, Vladislav Miadzel, Eugenia Novikova E.S. Towards application of text mining techniques to the analysis of the website's online consents // Izvestiya SPbGETU LETI. 2021. No. 4. pp. 42-48. eLIBRARY ID: 45736640 (in Russian).
  13. Elena Doynikova (Fedorchenko), Andrey Fedorchenko, Igor Ushakov, Andrey Krasov, Eugenia Novikova. Decision support for responding to violations in control systems using graph models // International Scientific Conference on Management Problems in Technical Systems. 2021. Vol. 1. pp. 278-282. eLIBRARY ID: 46684227 (in Russian).
  14. A. Jha, D. Tokarev, Eugenia Novikova, Elena Fedorchenko. Feature selection for attacker attributionin industrial automation & control systems // International Scientific Conference on Management Problems in Technical Systems. 2021. Vol. 1. pp. 273-277. eLIBRARY ID: 46684226 (in Russian).
  15. S.A. Golubev, I.N. Murenin, E.S. Novikova. Analysis of approaches to attribute selection for malware analysis based on images // XII St. Petersburg Interregional Conference "Information Security of Russian regions" (IBRD-2021). 2021. T 1. pp. 75-76 http://www.spoisu.ru/files/ibrr/ibrr2021/ibrr2021_materials.pdf (in Russian).
  16. E.V. Fedorchenko, A.V. Fedorchenko, E.S. Novikova, A.A. Branitsky, A.V. Meleshko, V.V. Puchkov. System for security assessment and counermeasure selection using semantic model of data and metrics // XII St. Petersburg Interregional Conference "Information Security of Russian Regions" (IBRD-2021). 2021. 1. pp. 102-103 http://www.spoisu.ru/files/ibrr/ibrr2021/ibrr2021_materials.pdf eLIBRARY ID: 48288960 (in Russian).
  17. E.V. Fedorchenko, E.S. Novikova, D.A. Gayfulina, I.V. Kotenko. Attacker profiling for security analysis and response to cyber incidents // In the collection: Actual problems of protection and security: Proceedings of the XXIV All-Russian Scientific and Practical Conference RARAN (March 31 - April 3, 2021). 2021. Volume 1. pp. 144-148 eLIBRARY ID: 48010763 (in Russian).

2020

  1. Evgenia Novikova, Igor Kotenko, Ivan Murenin. The visual analytics approach for analyzing trajectories of critical infrastructure employers // Energies. 2020. vol. 13. 15. pp. 3936. DOI: 10.3390/en13153936 (WoS, Scopus) https://www.mdpi.com/1996-1073/13/15/3936
  2. Elena Doynikova, Evgenia Novikova, Igor Kotenko. Attacker Behaviour Forecasting Using Methods of Intelligent Data Analysis: A Comparative Review and Prospects // Advanced Topics in Systems Safety and Security // Information (Switzerland). 2020. . 11. 3. . 168. 2020. vol. 11. 3. . 168 pp. 1-19. https://doi.org/10.3390/info11030168 (WoS) file:///C:/Users/Admin/Downloads/information-11-00168.pdf eLIBRARY ID: 43306145
  3. Evgenia Novikova, Mikhail Bestuzhev, Igor Kotenko. Anomaly Detection in the HVAC System Operation by a RadViz Based Visualization-Driven Approach // Lecture Notes in Computer Science. 2020. Vol 11980 LNCS, pp. 402-418. DOI: 10.1007/978-3-030-42048-2_26 (Scopus) eLIBRARY ID: 43253565
  4. Evgenia Novikova, Elena Doynikova, Igor Kotenko. P2Onto: Making Privacy Policies Transparent // The 3rd International Workshop on Attacks and Defenses for Internet-of-Things (ADIoT 2020), In Conjunction with ESORICS 2020. 4-6 November 2020, Paris, France. / Computer Security, Lecture Notes in Computer Science (LNCS), Springer. 2020. vol. 12501 LNCS. pp. 235-252. DOI: https://doi.org/10.1007/978-3-030-64330-0_15 (WoS, Scopus) eLIBRARY ID: 45049659
  5. Aleksei Malov, Ivan Kholod, Sergei Rodionov, Evgenia Novikova. Data Mining Algorithms Parallelization in the Framework of Agent-Oriented Programming // International Conference on Next Generation Wired/Wireless Networking Conference on Internet of Things and Smart Spaces // Lecture Notes in Computer Science (c. ), volume 12525 LNCS pp.135-147 DOI:10.1007/978-3-030-65726-0_13
  6. Murenin Ivan, Novikova Evgenia, Ushakov Roman, Kholod Ivan. Explaining Android Application Authorship Attribution Based on Source Code Analysis // International Conference on Next Generation Wired/Wireless Networking Conference on Internet of Things and Smart Spaces NEW2AN 2020, ruSMART 2020: Internet of Things, Smart Spaces, and Next Generation Networks and Systems pp 43-56 // Lecture Notes in Computer Science Vol.12525 LNCS DOI:10.1007/978-3-030-65726-0_5 (Scopus, )
  7. Novikova Evgenia, Bestuzhev Mikhail. Exploration of the Anomalies in HVAC Data Using Image Similarity Assessment // 2020 9th Mediterranean Conference on Embedded Computing (MECO), Budva, Montenegro. P. 9134218 DOI: 10.1109/MECO49872.2020.9134218 (Scopus) eLIBRARY ID: 45424269
  8. Novikova Evgenia, Belimova Polina, Dzhumagulova Alena, Bestuzhev Mikhail, Bezbakh Yulia, Volosiuk Aleksandr, Balkanskii Andrey, Alexei Lavrov. Usability Assessment of the Visualization-Driven Approaches to the HVAC Data Exploration // 30th International Conference on Computer Graphics and Machine Vision (Gaphicon 2020),Saint Petersburg, September 22-25, 2020. // Ceur Workshop Proceedings. Vol. 2744. pp. 1-12. http://ceur-ws.org/Vol-2744/paper17.pdf (Scopus) DOI:10.51130/graphicon-2020-2-3-17 eLIBRARY ID: 45055234
  9. E. S. Novikova, Ya. Bekeneva, M. Bestuzhev Visual analytics methods for monitoring heterogeneous data flows. News of LETI. 2020. N. 8-9. pp. 52-60. eLIBRARY ID: 44644450 (in Russian).
  10. E. S. Novikova Application of methods for projecting multidimensional data for the study of data from smart building management systems // Trends in the development of science and education. 2020. 68-1 .66-70 eLIBRARY ID: 44503536 DOI: 10.18411/lj-12-2020-18 (in Russian).
  11. E. V. Doynikova, E. S. Novikova Forecasting attacker behavior using intelligent data analysis // IX International scientific-technical and scientific-methodological conference " Actual problems of infotelecommunications in science and education "(APINO-2020)". February 26-27, 2020. Collection of scientific articles. 2020. Vol. 1. P. 415-418. eLIBRARY ID: 44604038 (in Russian).
  12. A.V. Kartel, E. S. Novikova, I. N. Murenin, E. V. Doynikova Defining attributes for malware authorship attributing based on control flow graph analysis // XVII St. Petersburg International Conference " Regional Informatics (RI-2020)". St. Petersburg, October 28-30, 2020, part 1., p. 139-141 eLIBRARY ID: 46541825 http://www.spoisu.ru/files/ri/ri2020/ri2020_materials_1.pdf (in Russian).
  13. I. N. Murenin, E. S. Novikova Analysis of self-similarity assessment techniques for network traffic of superhigh volumes // XVII St. Petersburg International Conference " Regional Informatics (RI-2020)". St. Petersburg, October 28-30, 2020, part 1., pp. 163-165 http://www.spoisu.ru/files/ri/ri2020/ri2020_materials_1.pdf eLIBRARY ID: 46544095 (in Russian).
  14. E. V. Doynikova, E. S. Novikova Response against cyberattacks considering attacker profile // Perspektivnye napravleniya razvitiya otechestvennykh informatsionnykh tekhnologii: materials of the VI interregional scientific and practical conference, Sevastopol, 22-26 Sep. 2020, pp. 203-204. eLIBRARY ID: 45844812 http://www.spoisu.ru/files/pnroit/pnroit-2020_materials.pdf (in Russian).
  15. E. S. Novikova, M. P. Bestuzhev Definition of the requirements to methods of visual analysis of data streams in real time // Perspective directions of development of domestic information technologies: materials of the VI interregional scientific and practical conference, Sevastopol, September 22-26, 2020, pp. 209-210. eLIBRARY ID: 45844816 http://www.spoisu.ru/files/pnroit/pnroit-2020_materials.pdf (in Russian).
  16. E. S. Novikova, I. N. Murenin A technique for interpretability of machine learning models in the problem of attributing the software code // Perspective directions of development of domestic information technologies: materials of the VI interregional scientific and practical conference, Sevastopol, September 22-26, 2020, pp. 211-212. eLIBRARY ID: 45844817 http://www.spoisu.ru/files/pnroit/pnroit-2020_materials.pdf (in Russian).

2019

  1. Evgenia Novikova, Igor Kotenko Visualization-Driven Approach to Fraud Detection in the Mobile Money Transfer Services // In book: Algorithms, Methods, and Applications in Mobile Computing and Communications P .205-236 DOI:10.4018/978-1-5225-5693-0.ch009
  2. Evgenia Novikova, Igor Kotenko. Open challenges in visual analytics for security information and event management // Information & Control Systems. 2019. no. 2. pp. 57-67. https://cyberleninka.ru/article/n/otkrytye-zadachi-vizualnogo-analiza-v-sistemah-upravleniya-informatsionnoy-bezopasnostyu/viewer eLIBRARY ID: 41138301 (in Russian).

2017

  1. Evgenia Novikova, Ivan Murenin. Visualization-Driven Approach to Anomaly Detection in the Movement of Critical Infrastructure // Computer Network Security. Lecture Notes in Computer Science, Springer-Verlag. The 2017 7th International Conference on Mathematical Methods, Models and Architectures for Computer Networks Security (MMM-ACNS-2017). August 28-30, 2017, Warsaw, Poland, Vol. 10446 LNCS P.5061. DOI: 10.1007/978-3-319-65127-9_5. eLIBRARY ID: 31080040
  2. Evgenia Novikova, Ivan Murenin. The technique of the visual analysis of the organization employees routes for anomaly detection // SPIIRAS Proceedings. No. 5 (54), 2017. P. 57-83. eLIBRARY ID: 30282020 DOI: 10.15622/sp.54.3 (in Russian).

2016

  1. Evgenia Novikova, Igor Kotenko. Detection of anomalous activity in mobile money transfer services using RADViz-visualization // SPIIRAS Proceedings. 2016. Issue 48. P.32-51. eLIBRARY ID: 27177923 DOI: 10.15622/sp.48.2 (in Russian).
  2. Evgenia Novikova, Igor Kotenko, Eugene Fedotov. Visual data analysis for anomalies detection in mobile money transfer services // Information Security. Inside, 2016, 4(70), P.40-47; eLIBRARY ID: 27035153; 5(71), P.72-82. eLIBRARY ID: 27035199 (in Russian).
  3. Evgenia Novikova. Generation of the patterns of objects movement in the dynamic environment // Journal "Methods and technical means of ensuring information security" // 25th scientific and Technical conference "Methods and technical means of ensuring information security". July 4-July 7, 2016 St. Petersburg. Materials. Polytechnic University Press 25 P.106-108. eLIBRARY ID: 36546800 (in Russian).

2015

  1. Igor Kotenko, Evgenia Novikova, Andrey Chechulin. Visualization of security metrics for security monitoring and event management. Problems of information security. Computer systems. 4, 2015. P.42-47. (in Russian).

2014

  1. Igor Kotenko, Andrey Shorov, Andrey Chechulin, Evgenia Novikova. Dynamical Attack Simulation for Security Information and Event Management. V. Popovich et al. (eds.), Information Fusion and Geographic Information Systems (IF&GIS 2013), Lecture Notes in Geoinformation and Cartography, DOI: 10.1007/978-3-642-31833-7_14, Springer-Verlag, Berlin, Heidelberg, 2014. P.219-234.
  2. Igor Kotenko, Evgenia Novikova. Visualization of Security Metrics for Cyber Situation Awareness // The 1st International Software Assurance Workshop (SAW 2014). In conjunction with the 9th International Conference on Availability, Reliability and Security (ARES 2014). September 8nd 12th, 2014. Fribourg, Switzerland. IEEE Computer Society. 2014. P.506-513. (WoS, Scopus)
  3. Evgenia Novikova, Igor Kotenko. Visual Analytics for Detecting Anomalous Activity in Mobile Money Transfer Services // International Cross Domain Conference and Workshops (CD-ARES 2014). September 8nd 12th, 2014. Fribourg, Switzerland. Lecture Notes in Computer Science (LNCS), Vol.8708. Springer-Verlag. 2014, P.63-78. (WoS, Scopus)
  4. Igor Kotenko, Evgenia Novikova. The models and techniques of a visual data analysis for task solution of the cyber security // 16th Conference RusCrypto on Cryptology, Steganography, Digital Signature and Security Systems. Solnechnogorsk, Russia. March 25-28, 2014. http://www.ruscrypto.ru/ (in Russian).
  5. Igor Kotenko, Evgenia Novikova. Visual analytics guard of the information security. International Forum on practical security Positive Hack Days. Moscow. May 21-22, 2014. http://www.phdays.ru (in Russian).

2013

  1. Igor Kotenko, Evgenia Novikova. The Visual Analysis For Computer Network Security Assessment. Information and Control Systems, 2013, 3. P.55-61. (in Russian).
  2. Evgenia Novikova, Igor Kotenko. The design of the visualisation subsystem of the SIEM-system// Information Technologies , 9, 2013.Moscow, New Technology. P.32-36. (in Russian).
  3. Igor Kotenko, Evgenia Novikova. Visualization Techniques for Security Information and Event Management. Issues of Information Protection, 3, 2013. .33-42. (in Russian).
  4. Evgenia Novikova. Visual Models for Presentation of Information about Network Security. Innovations in Science, 16-1, 2013. Novosibirsk, SibAK, 2013. .116-120. (in Russian).
  5. Anna Demyanchuk, Dmitri Moldovyan, Evgenia Novikova, Denis Gurianov. An Approach to Digital Sceme Construction Based on Two Difficult Problems. Information and Control Systems, 2, 2013. .60-66. (in Russian).
  6. Evgenia Novikova. Visualization of the Logs of the Mobile Money Transfer Services For Detecting Fraudster Activity. Proceedings ETU "LETI". 2013. 4. .44-48. (in Russian).
  7. Evgenia Novikova. Visual analytics technique for analysis of events of the mobile money system// 22th All-Russian Conference Methods and technical tools of information security(MTTIS 2013). Proceedings. St.Petersburg, Russia. July 08-11, 2013. P.37-39. (in Russian).
  8. Igor Kotenko, Evgenia Novikova. An approach to design of the visual analytical system for security information management on Russian Railways. VIII Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2013)", Saint-Petersburg, October 23-25, 2013. The proceedings of conference, 2013. P.106-107. (in Russian).
  9. Evgenia Novikova. Detection of the anomalous activity in mobile money system using visual analytics techniques. VIII Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2013)", Saint-Petersburg, October 23-25, 2013. The proceedings of conference, 2013. P.120. (in Russian).
  10. Evgenia Novikova , Jana Mondikova. Towards design of practical work "Blind digital signature" for "Criptographical Protocols" course. XIX International Scientific and Practical Conference "Modern education: content, technology, quality". Proceedings. St. Petersburg, Russia. April 24, 2013. P.135-136. (in Russian).
  11. Evgenia Novikova. The usage of interactive technologies in practical works for "Information system intrusion techniques and computer virology" course. XIX International Scientific and Practical Conference "Modern education: content, technology, quality". Proceedings. St. Petersburg, Russia. April 24, 2013. .178-179. (in Russian).
  12. Anna Demjanchuk, Evgenia Novikova, Dmitrii Moldovyan. An approach for security level enforcement of the zero-knowledge authentication protocols. VIII Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2013)", Saint-Petersburg, October 23-25, 2013. The proceedings of conference, 2013. P.51-52. (in Russian).
  13. Igor Kotenko, Andrey Shorov, Evgenia Novikova. Simulation of Protection Mechanisms Based on "Network Nervous System" against Infrastructure Attacks. Proceedings of the 21th Euromicro International Conference on Parallel, Distributed and network-based Processing (PDP 2013). Belfast, Northern Ireland, UK. 27th February 1st March 2013. Los Alamitos, California. IEEE Computer Society. 2013. P.526-533.
  14. Evgenia Novikova, Igor Kotenko. Analytical Visualization Techniques for Security Information and Event Management. Proceedings of the 21th Euromicro International Conference on Parallel, Distributed and network-based Processing (PDP 2013). Belfast, Northern Ireland, UK. 27th February 1st March 2013. Los Alamitos, California. IEEE Computer Society. 2013. P.519-525.
  15. Igor Kotenko, Evgenia Novikova. VisSecAnalyzer: a Visual Analytics Tool for Network Security Assessment. 3rd IFIP International Workshop on Security and Cognitive Informatics for Homeland Defense (SeCIHD 2013). In conjunction with the 8th International Conference on Availability, Reliability and Security (ARES 2013). September 2-6, 2013, Regensburg, Germany. Lecture Notes in Computer Science (LNCS), Vol.8128. Springer. 2013, P.345-360.

2012

  1. Igor Kotenko, Andrey Chechulin, Evgenia Novikova. Attack Modelling and Security Evaluation for Security Information and Event Management. SECRYPT 2012. International Conference on Security and Cryptography. Proceedings. Rome, Italy. 2427 July 2012. P.391-394. (Scopus)
  2. Evgenia Novikova, Igor Kotenko. Visualzation Techniques in SIEM-systems // High availability systems, 2, 2012. P.91-99. (in Russian).
  3. Evgenia Novikova, Igor Kotenko.The analysis of the visualization techniques to ensure the protection of information in computer networks // Proceedings of SPIIRAS. Issue.4 (23). SPb.: Science, 2012. Pp. 7-29. (in Russian).
  4. Evgenia Novikova. The Design of the New Course "Computer Virology and Intrusion Methods Detection" As Renovation of the Basis Course. Proceedings ETU LETI. 2012. 4. P.44-48. (in Russian).
  5. Evgenia Novikova. Visualisation Mechanisms in SIEM-systems. 14th Conference RusCrypto on Cryptology, Steganography, Digital Signature and Security Systems. Solnechnogorsk, Russia. March 28-30, 2012 http://www.ruscrypto.ru/ (in Russian).
  6. Evgenia Novikova. Attack graph visualization techniques. 21th All-Russian Conference "Methods and technical tools of information security" (MTTIS 2012). Proceedings. St.Petersburg, Russia. June 24-29, 2012. P.69-70. (in Russian).
  7. Evgenia Novikova, Chechulin A.A., Igor Kotenko. Visualisation techniques for computer attack counteraction in security information and event management systems. St. Petersburg Scientific Forum "Science and Society". "Science and Mankind Progress". VII St.Petersburg Nobel Prize Laureates Meeting. Proceedings. St.Petersburg, Russia. P.151-152. (in Russian).
  8. Andrey Chechulin, Igor Kotenko, Evgenia Novikova, Elena Doynikova. Attacks and protection mechanisms in the security event and information management. 5th Russian Multiconference on Problems in Control (MPC). Conference on Information Technologies in Control (ITC).Proceedings. St.Petersburg, Russia. October 911, 2012. P.735-739. (in Russian).
  9. Evgenia Novikova. Techniques of the visual analysis for computer network security assessment. XIII Saint-Petersburg International Conference Regional informatics-2012 (RI-2012). Proceedings. St.Petersburg, 2012. P.114. (in Russian).
  10. Evgenia Novikova. Design of the visualization component for security event and information management. XIII Saint-Petersburg International Conference Regional informatics-2012 (RI-2012). Proceedings. St. Petersburg, 2012. .115 (in Russian).
  11. Dmitry Moldovyan, Evgenia Novikova, Alexey Rizhkov, I. Vasiliev. The collective digital signature with message recovery. 65 conference of the teaching stuff of the St. Petersburg State Electrotechnical University, Proceedings. St. Petersburg. Russia. January 24 - February 4, 2012. P.115-119. (in Russian).
  12. Anna Demyanchuk, Dmitry Moldovyan, Evgenia Novikova. Zero knowledge protocols of "request-response" type. All-Army Scientific Conference" Innovations in the Armed Forces of the Russian Federation". Proceedings. St.Petersburg, Russia. November 29-30, 2012. P.144-148. (in Russian).
  13. Evgenia Novikova. Visual models for computer network security analysis. XVII St.Petersburg assembly of young scientists and specialists. Proceedings. October 12, 2012. P.196. (in Russian).
  14. Evgenia Novikova. Education technologies for teaching network intrusion detection providing adaptive mobility of the specialists in computer security. XVIII International Scientific and Practical Conference "Modern education: content, technology, quality". Proceedings. St. Petersburg, Russia. April 18, 2012, .1. P.221-222. (in Russian).
  15. Alexandr Moldovyan, Nikolay Moldovyan, Evgenia Novikova. Blind 384-bit Digital Signature Scheme. Lecture Notes in Computer Science, Springer-Verlag, Vol. 7531. The Sixth International Conference "Mathematical Methods, Models and Architectures for Computer Networks Security" (MMM-ACNS-2012). October 17-19, 2012, St. Petersburg, Russia. P.77-83.

2011

  1. Nikolay Moldovyan, Evgenia Dernova (Novikova), Dmitri Moldovyan. The Functionality Extension of Digital Signature Standards of Russian Federation and Belorus. Issues of Information Protection. 2011. 2. P.8-14. (in Russian).
  2. Dmitri Moldovyan, Evgenia Dernova (Novikova), D. Sukhov. The Functionality Extension of Digital Signature Standards. Information Technologies and Computing Systems. 2011. 2. P.63-67. (in Russian).
  3. Nikolay Moldovyan, Evgenia Dernova (Novikova), Dmitri Moldovyan.The Blind and Collective Digital Signature Protocols based on Standard DSTU 4145-2002. Issues of Information Protection. 2011. 2. P.14-18. (in Russian).
  4. Roman Kishmar, Petr Moldovyanu, Evgenia Dernova (Novikova), D. Sukhov. The Blind Digital Signature Scheme based on Difficulty of Two Hard Problems. Proceedings ETU "LETI". 2011. 4. P.44-48 (in Russian).

2010

  1. Dmitri Moldovyan, Evgeniia Dernova (Novikova), Nikolay Moldovyan. Digital Signature Schemes with New Randomization Mechanism. Informatization and Communication. 2010. 1. P.66-71. (in Russian).
  2. Lidiya Gortinskaya, Evgenia Dernova (Novikova), Dmitri Moldovyan, Petr Moldovyanu. Construction of the Finite Groups of Vectors for Algorithms of Digital Signature Schemes. Journal of Instrument Engineering.2010. 5. P.11-16. (in Russian).
  3. Evgenia Dernova (Novikova), Ivan Kupriyanov, Dmitri Moldovyan, Alexandr Moldovyan. Blind Digital Schemes with New Features. Informatization and Communication. 2010. 1. P.72-76. (in Russian).

2009

  1. Evgeniia Dernova (Novikova), Anna Kostina, Nikolay Moldovyan, Petr Moldovyanu. Towards Application of Finite Vector Spaces in Cryptography. Issues of Radioelectronics. 2009, issue. 2. P.165-174. (in Russian).
  2. Petr Moldovyanu, Dmitri Moldovyan, Evgeniia Dernova (Novikova). Usage of Homomorphy and Multidimensional Cyclicity of Finite Group Vectors in Digital Signature Algorithms. Issues of Information Protection. 2009. 3(86). P.2-9. (in Russian).
  3. Petr Moldovyanu, Dmitri Moldovyan Evgeniia Dernova (Novikova), Anna Kostina. Homomorphy of Finite Vector Groups and Digital Signature Scheme Design. Information Technologies and Computing Systems. 2009 4(41). P.33-40. (in Russian).
  4. Moldovyan P.A., Dernova (Novikova) E.S., Kostina A.A., Moldovyan N.A. Multisignature Protocols and Problem of Simultaneous Signing a Package of Contracts // Springer LNGC. 2009. / 4th Int. Workshop IF&GIS'09 Proc. St.Petersburg, May 17-20, 2009. St. Petersburg, Russia

2008

  1. Evgeniia Dernova (Novikova), Nikolay Moldovyan. Design of Digital Signature Schemes based on Several Hard Problems. Issues of Information Protection. 2008. 1. P.22-26. (in Russian).
  2. Evgeniia Dernova (Novikova), Nikolay Moldovyan. Collective Digital Signature Protocol based on Two Hard Problems. Security of Infortmation Technologies. 2008 2. P.79-85. (in Russian).
  3. Evgeniia Dernova (Novikova), Dmitri Moldovyan, Petr Moldovyanu. The construction of the Finite Augmented Field for Cryptographic Applications. Issues of Information Protection. 2008. 3(82). P.2-7. (in Russian).
  4. Evgeniia Dernova (Novikova), Anna Kostina, Petr Moldovyanu. Using Finite Group of Matrices for Digital Signature Algorithms Construction. Issues of Information Protection. 2008. 3(82). P.8-12. (in Russian).
  5. Denis Guryanov, Evgeniia Dernova (Novikova), V. Izbash, Dmitri Moldovyan. Algorithms of Digital Signature Based on Difficulty of Rooting Problem in Finite Groups of Known Order. Information Technologies and Computing Systems. 2008 5. P.33-40. (in Russian).

Top 

RUSSIA, 199178, Saint-Petersburg, liniya 14-ya, 39, SPC RAS (metro station Vasileostrovskaya).
+7-(812)-328-7181, +7-(812)-328-2642, ivkote[AT]comsec[DOT]spb[DOT]ru

Comments? Questions? chechulin[AT]comsec[DOT]spb[DOT]ru

Locations of visitors to this page