Visualization of complex attacks and state of attacked network A Yelizarov, D Gamayunov 2009 6th International Workshop on Visualization for Cyber Security, 1-9, 2009 | 33 | 2009 |
Securing mobile devices: malware mitigation methods. A Skovoroda, D Gamayunov J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 6 (2), 78-97, 2015 | 30 | 2015 |
Adaptive visualization interface that manages user's cognitive load based on interaction characteristics A Yelizarov, D Gamayunov Proceedings of the 7th international symposium on visual information …, 2014 | 28 | 2014 |
Review of the mobile malware detection approaches A Skovoroda, D Gamayunov 2015 23rd Euromicro International Conference on Parallel, Distributed, and …, 2015 | 18 | 2015 |
Racewalk: fast instruction frequency analysis and classification for shellcode detection in network flow D Gamayunov, NTM Quan, F Sakharov, E Toroshchin 2009 European Conference on Computer Network Defense, 4-12, 2009 | 17 | 2009 |
Automated static analysis and classification of android malware using permission and api calls models A Skovoroda, D Gamayunov 2017 15th annual conference on privacy, security and trust (PST), 243-24309, 2017 | 16 | 2017 |
Review of the mobile malware detection approaches: Parallel, Distributed and Network-Based Processing (PDP) S Anastasia, D Gamayunov Proc. 2015. IEEE 23rd Euro micro International Conference, 600-603, 2015 | 8 | 2015 |
Falsifiability of network security research: The good, the bad, and the ugly D Gamayunov Proceedings of the 1st ACM SIGPLAN Workshop on Reproducible Research …, 2014 | 7 | 2014 |
Network traffic analysis optimization for signature-based intrusion detection systems DS Kazachkin, DY Gamayunov Proceedings of the Spring/Summer Young Researchers’ Colloquium on Software …, 2008 | 7 | 2008 |
Adaptive Security Event Visualization for Continuous Monitoring. A Yelizarov, D Gamayunov UMAP Workshops, 2013 | 6 | 2013 |
Toward network access control with software-defined networking D Gamayunov, I Platonov, R Smeliansky Internet: http://www. researchgate. net/profile/Ruslan_Smeliansky …, 2013 | 5 | 2013 |
Hide and seek: worms digging at the Internet backbones and edges S Gaivoronski, D Gamayunov Proceedings of the Spring/Summer Young Researchers’ Colloquium on Software …, 2013 | 3 | 2013 |
Dead or alive: Discovering server HTTP endpoints in both reachable and dead client-side code D Sigalov, D Gamayunov Journal of Information Security and Applications 82, 103746, 2024 | 2 | 2024 |
Towards malware-resistant networking environment D Gamayunov 2011 First SysSec Workshop, 79-82, 2011 | 2 | 2011 |
Finding Server-Side Endpoints with Static Analysis of Client-Side JavaScript D Sigalov, D Gamayunov European Symposium on Research in Computer Security, 442-458, 2023 | 1 | 2023 |
A model of the behavior of network objects in distributed computer systems DY Gamayunov, RL Smelyanskii Programming and Computer Software 33 (4), 195-203, 2007 | 1 | 2007 |
On the applicability and limitations of formal verification of machine learning systems D Namiot, E Ilyushin, I Chizov, D Gamayunov Распределенные компьютерные и телекоммуникационные сети: управление …, 2021 | | 2021 |
GOOGLE IT: TOTAL INFORMATION AWARENESS D Gamayunov, M Voronov, N Lee | | 2016 |
Autonomous Vulnerability Scanning and Patching of Binaries D Gamayunov, M Voronov, N Lee Google It: Total Information Awareness, 419-430, 2016 | | 2016 |
Towards automated web application logic reconstruction for application level security G Noseevich, D Gamayunov arXiv preprint arXiv:1511.02564, 2015 | | 2015 |