Følg
Andrey Dolgikh
Andrey Dolgikh
Binghamton University
Verifisert e-postadresse på acm.org
Tittel
Sitert av
Sitert av
År
Unmanned aerial vehicle security using recursive parameter estimation
Z Birnbaum, A Dolgikh, V Skormin, E O’Brien, D Muller, C Stracquodaine
Journal of Intelligent & Robotic Systems 84, 107-120, 2016
1072016
Unmanned aerial vehicle security using behavioral profiling
Z Birnbaum, A Dolgikh, V Skormin, E O'Brien, D Muller, C Stracquodaine
2015 International conference on unmanned aircraft systems (ICUAS), 1310-1319, 2015
672015
Expressive, efficient and obfuscation resilient behavior based IDS
AG Tokhtabayev, VA Skormin, AM Dolgikh
European Symposium on Research in Computer Security, 698-715, 2010
302010
Industrial control systems security testbed
E Korkmaz, A Dolgikh, M Davis, V Skormin
11th Annual Symposium on Information Assurance, 13-18, 2016
292016
ICS security testbed with delay attack case study
E Korkmaz, A Dolgikh, M Davis, V Skormin
MILCOM 2016-2016 IEEE Military Communications Conference, 283-288, 2016
232016
Detection and mitigation of time delay injection attacks on industrial control systems with PLCs
E Korkmaz, M Davis, A Dolgikh, V Skormin
Computer Network Security: 7th International Conference on Mathematical …, 2017
172017
Unmanned Aerial System security using real-time autopilot software analysis
C Stracquodaine, A Dolgikh, M Davis, V Skormin
2016 International Conference on Unmanned Aircraft Systems (ICUAS), 830-839, 2016
172016
Cloud security auditing based on behavioral modeling
Z Birnbaum, B Liu, A Dolgikh, Y Chen, V Skormin
2013 IEEE Ninth World Congress on Services, 268-273, 2013
172013
Using behavioral modeling and customized normalcy profiles as protection against targeted cyber-attacks
A Dolgikh, T Nykodym, V Skormin, Z Birnbaum
International Conference on Mathematical Methods, Models, and Architectures …, 2012
172012
Colored Petri nets as the enabling technology in intrusion detection systems
A Dolgikh, T Nykodym, V Skormin, J Antonakos, M Baimukhamedov
2011-MILCOM 2011 Military Communications Conference, 1297-1301, 2011
162011
Behavioral modeling for suspicious process detection in cloud computing environments
A Dolgikh, Z Birnbaum, Y Chen, V Skormin
2013 IEEE 14th International Conference on Mobile Data Management 2, 177-181, 2013
122013
Detection of worm propagation engines in the system call domain using colored petri nets
AG Tokhtabayev, VA Skormin, AM Dolgikh
2008 IEEE International Performance, Computing and Communications Conference …, 2008
112008
Dynamic, resilient detection of complex malicious functionalities in the system call domain
A Tokhtabayev, V Skormin, A Dolgikh
2010-MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE, 1349-1356, 2010
92010
The behavioral approach to diagnostics of cyber-physical systems
V Skormin, A Dolgikh, Z Birnbaum
2014 IEEE AUTOTEST, 26-30, 2014
82014
Computer network testbed at binghamton university
A Dolgikh, T Nykodym, V Skormin, J Antonakos
2011-MILCOM 2011 Military Communications Conference, 1146-1151, 2011
72011
Resident security system for government/industry owned computers
M Davis, E Korkmaz, A Dolgikh, V Skormin
Computer Network Security: 7th International Conference on Mathematical …, 2017
62017
Cloud security auditing based on behavioural modelling
A Dolgikh, Z Birnbaum, B Liu, Y Chen, V Skormin
International Journal of Business Process Integration and Management 7 (2 …, 2014
62014
Automatic functionality detection in behavior-based ids
T Nykodym, V Skormin, A Dolgikh, J Antonakos
2011-MILCOM 2011 Military Communications Conference, 1302-1307, 2011
62011
Customized behavioral normalcy profiles for critical infrastructure protection
A Dolgikh, Z Birnbaum, V Skormin
8th Annual Symposium on Information Assurance (ASIA 2013), Albany, NY, 15-22, 2013
42013
Behavior based approach for intrusion detection systems
A Dolgikh
State University of New York at Binghamton, 2013
42013
Systemet kan ikke utføre handlingen. Prøv på nytt senere.
Artikler 1–20