Fully homomorphic encryption schemes: The state of the art KG Kogos, KS Filippova, AV Epishkina 2017 IEEE Conference of Russian Young Researchers in Electrical and …, 2017 | 23 | 2017 |
Authentication protocols based on one-time passwords S Babkin, A Epishkina 2019 IEEE Conference of Russian Young Researchers in Electrical and …, 2019 | 21 | 2019 |
Covert channels parameters evaluation using the information theory statements A Epishkina, K Kogos 2015 5th International Conference on IT Convergence and Security (ICITCS), 1-5, 2015 | 19 | 2015 |
A random traffic padding to limit packet size covert channels A Epishkina, K Kogos 2015 Federated Conference on Computer Science and Information Systems …, 2015 | 16 | 2015 |
Handwritten signature attributes for its verification A Beresneva, A Epishkina, D Shingalova 2018 IEEE Conference of Russian Young Researchers in Electrical and …, 2018 | 14 | 2018 |
Random delays to limit timing covert channel A Belozubova, A Epishkina, K Kogos 2016 European Intelligence and Security Informatics Conference (EISIC), 188-191, 2016 | 13 | 2016 |
A syllabus on data mining and machine learning with applications to cybersecurity A Epishkina, S Zapechnikov 2016 Third International Conference on Digital Information Processing, Data …, 2016 | 13 | 2016 |
Continuous authentication of smartphone users via swipes and taps analysis A Garbuz, A Epishkina, K Kogos 2019 European Intelligence and Security Informatics Conference (EISIC), 48-53, 2019 | 9 | 2019 |
Practical user and entity behavior analytics methods for fraud detection systems in online banking: A survey P Slipenchuk, A Epishkina Biologically Inspired Cognitive Architectures 2019: Proceedings of the Tenth …, 2020 | 8 | 2020 |
Review of covert channels over HTTP: Communication and countermeasures KG Kogos, EI Seliverstova, AV Epishkina 2017 IEEE Conference of Russian Young Researchers in Electrical and …, 2017 | 8 | 2017 |
Special digital signature schemes based on GOST R 34.10-2012 A Beresneva, A Epishkina, O Isupova, K Kogos, M Shimkiv 2016 IEEE NW Russia Young Researchers in Electrical and Electronic …, 2016 | 8 | 2016 |
One-time passwords: resistance to masquerade attack S Babkin, A Epishkina Procedia computer science 145, 199-203, 2018 | 6 | 2018 |
Secure one-way data transfer V Arkhangelskii, A Epishkina, V Kalmykov, K Kogos 2016 IEEE NW Russia Young Researchers in Electrical and Electronic …, 2016 | 6 | 2016 |
Traffic normalization for covert channel protecting D Frolova, K Kogos, A Epishkina 2021 IEEE Conference of Russian Young Researchers in Electrical and …, 2021 | 5 | 2021 |
Discovering and clustering hidden time patterns in blockchain ledger A Epishkina, S Zapechnikov Biologically Inspired Cognitive Architectures (BICA) for Young Scientists …, 2018 | 5 | 2018 |
A traffic padding to limit packet size covert channels A Epishkina, K Kogos 2015 3rd International Conference on Future Internet of Things and Cloud …, 2015 | 5 | 2015 |
Timing covert channels detection cases via machine learning A Epishkina, M Finoshin, K Kogos, A Yazykova 2019 European Intelligence and Security Informatics Conference (EISIC), 139-139, 2019 | 4 | 2019 |
Handwritten signature verification: the state of the art A Beresneva, A Epishkina, S Babkin, A Kurnev, V Lermontov Biologically Inspired Cognitive Architectures (BICA) for Young Scientists …, 2018 | 4 | 2018 |
Packet length covert channel capacity estimation A Epishkina, K Kogos 2016 6th International Conference on IT Convergence and Security (ICITCS), 1-4, 2016 | 4 | 2016 |
Protection from binary and multi-symbol packet length covert channels A Epishkina, K Kogos Proceedings of the 8th International Conference on Security of Information …, 2015 | 4 | 2015 |