A methodology for the analysis and modeling of security threats and attacks for systems of embedded components JF Ruiz, R Harjani, A Mana, V Desnitsky, I Kotenko, A Chechulin 2012 20th Euromicro International Conference on Parallel, Distributed and …, 2012 | 80 | 2012 |
Design technique for secure embedded devices: Application for creation of integrated cyber-physical security system. V Desnitsky, D Levshun, A Chechulin, IV Kotenko J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 7 (2), 60-80, 2016 | 53 | 2016 |
Detection of anomalies in data for monitoring of security components in the Internet of Things VA Desnitsky, IV Kotenko, SB Nogin 2015 XVIII International Conference on Soft Computing and Measurements (SCM …, 2015 | 38 | 2015 |
Configuration-based approach to embedded device security V Desnitsky, I Kotenko, A Chechulin Computer Network Security: 6th International Conference on Mathematical …, 2012 | 34 | 2012 |
Expert knowledge based design and verification of secure systems with embedded devices V Desnitsky, I Kotenko Availability, Reliability, and Security in Information Systems: IFIP WG 8.4 …, 2014 | 29 | 2014 |
Machine learning based approach to detection of anomalous data from sensors in cyber-physical water supply systems AV Meleshko, VA Desnitsky, IV Kotenko IOP conference series: materials science and engineering 709 (3), 033034, 2020 | 28 | 2020 |
Modeling and analysis of IoT energy resource exhaustion attacks V Desnitsky, I Kotenko Intelligent Distributed Computing XI, 263-270, 2018 | 27 | 2018 |
Approach to detection of denial-of-sleep attacks in wireless sensor networks on the base of machine learning A Balueva, V Desnitsky, I Ushakov Intelligent Distributed Computing XIII, 350-355, 2020 | 23 | 2020 |
An approach for network information flow analysis for systems of embedded components A Chechulin, I Kotenko, V Desnitsky Computer Network Security: 6th International Conference on Mathematical …, 2012 | 23 | 2012 |
Modeling and analysis of security incidents for mobile communication mesh Zigbee-based network VA Desnitsky, IV Kotenko 2017 XX IEEE International Conference on Soft Computing and Measurements …, 2017 | 21 | 2017 |
Combined design technique for secure embedded devices exemplified by a perimeter protection system V Desnitsky, AA Chechulin, IV Kotenko, DS Levshun, MV Kolomeec Informatics and Automation 48, 5-31, 2016 | 21 | 2016 |
Simulation and assessment of battery depletion attacks on unmanned aerial vehicles for crisis management infrastructures V Desnitsky, I Kotenko Simulation Modelling Practice and Theory 107, 102244, 2021 | 19 | 2021 |
Application of a technique for secure embedded device design based on combining security components for creation of a perimeter protection system V Desnitsky, A Chechulin, I Kotenko, D Levshun, M Kolomeec 2016 24th Euromicro International Conference on Parallel, Distributed, and …, 2016 | 19 | 2016 |
Security event analysis in XBee-based wireless mesh networks VA Desnitsky, IV Kotenko 2018 IEEE Conference of Russian Young Researchers in Electrical and …, 2018 | 18 | 2018 |
Monitoring and counteraction to malicious influences in the information space of social networks I Kotenko, I Saenko, A Chechulin, V Desnitsky, L Vitkova, A Pronoza International Conference on Social Informatics, 159-167, 2018 | 17 | 2018 |
Modeling and evaluation of battery depletion attacks on unmanned aerial vehicles in crisis management systems V Desnitsky, N Rudavin, I Kotenko Intelligent Distributed Computing XIII, 323-332, 2020 | 15 | 2020 |
Neural network based classification of attacks on wireless sensor networks VA Desnitsky, IV Kotenko, IB Parashchuk 2020 IEEE Conference of Russian Young Researchers in Electrical and …, 2020 | 14 | 2020 |
Protection mechanisms against energy depletion attacks in cyber-physical systems VA Desnitsky, IV Kotenko, NN Rudavin 2019 IEEE Conference of Russian Young Researchers in Electrical and …, 2019 | 14 | 2019 |
Ensuring availability of wireless mesh networks for crisis management V Desnitsky, I Kotenko, N Rudavin Intelligent Distributed Computing XII, 344-353, 2018 | 13 | 2018 |
Automated design, verification and testing of secure systems with embedded devices based on elicitation of expert knowledge V Desnitsky, I Kotenko Journal of ambient intelligence and humanized computing 7, 705-719, 2016 | 13 | 2016 |