ติดตาม
Maxim Kolomeets
Maxim Kolomeets
ชื่ออื่นๆMaxim Kolomeec, Maksim Kalameyets, Максим Коломеец
ยืนยันอีเมลแล้วที่ newcastle.ac.uk - หน้าแรก
ชื่อ
อ้างโดย
อ้างโดย
ปี
Comparative study of machine learning methods for in-vehicle intrusion detection
I Berger, R Rieke, M Kolomeets, A Chechulin, I Kotenko
International Workshop on Security and Privacy Requirements Engineering, 85-101, 2018
602018
Choosing models for security metrics visualization
M Kolomeec, G Gonzalez-Granadillo, E Doynikova, A Chechulin, ...
Computer Network Security: 7th International Conference on Mathematical …, 2017
452017
Обзор методологических примитивов для поэтапного построения модели визуализации данных
МВ Коломеец, АА Чечулин, ИВ Котенко
Информатика и автоматизация 5 (42), 232-257, 2015
342015
Комбинированная методика проектирования защищенных встроенных устройств на примере системы охраны периметра
ВА Десницкий, АА Чечулин, ИВ Котенко, ДС Левшун, МВ Коломеец
Информатика и автоматизация 48 (0), 5-31, 2016
332016
A visual analytics approach for the cyber forensics based on different views of the network traffic.
IV Kotenko, M Kolomeets, A Chechulin, Y Chevalier
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 9 (2), 57-73, 2018
322018
Technique of Data Visualization: Example of Network Topology Display for Security Monitoring.
M Kolomeec, A Chechulin, A Pronoza, IV Kotenko
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 7 (1), 58-78, 2016
312016
Analysis of the malicious bots market
M Kolomeets, A Chechulin
2021 29th conference of open innovations association (FRUCT), 199-205, 2021
262021
Bot detection by friends graph in social networks.
M Kolomeets, A Chechulin, IV Kotenko
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 12 (2), 141-159, 2021
242021
Combined design technique for secure embedded devices exemplified by a perimeter protection system
V Desnitsky, AA Chechulin, IV Kotenko, DS Levshun, MV Kolomeec
Informatics and Automation 48, 5-31, 2016
242016
Application of a technique for secure embedded device design based on combining security components for creation of a perimeter protection system
V Desnitsky, A Chechulin, I Kotenko, D Levshun, M Kolomeec
2016 24th Euromicro International Conference on Parallel, Distributed, and …, 2016
192016
Methodological Primitives for Phased Construction of Data Visualization Models
M Kolomeec, A Chechulin, I Kotenko
Journal of Internet Services and Information Security 5 (4), 60-84, 2015
192015
Camouflaged bot detection using the friend list
M Kolomeets, O Tushkanova, D Levshun, A Chechulin
2021 29th Euromicro international conference on parallel, distributed and …, 2021
162021
Методика визуализации метрик кибербезопасности
МВ Коломеец, АА Чечулин, ЕВ Дойникова, ИВ Котенко
Известия высших учебных заведений. Приборостроение 61 (10), 873-880, 2018
162018
Complex online harms and the smart home: A scoping review
S Olabode, R Owens, VN Zhang, J Copilah-Ali, M Kolomeets, H Wu, ...
Future Generation Computer Systems 149, 664-678, 2023
152023
Access control visualization using triangular matrices
M Kolomeets, A Chechulin, I Kotenko, I Saenko
2019 27th Euromicro International Conference on Parallel, Distributed and …, 2019
152019
Visualization model for monitoring of computer networks security based on the analogue of voronoi diagrams
M Kolomeets, A Chechulin, I Kotenko
Availability, Reliability, and Security in Information Systems: IFIP WG 8.4 …, 2016
152016
Approach to identification and analysis of information sources in social networks
L Vitkova, M Kolomeets
Intelligent Distributed Computing XIII, 285-293, 2020
122020
Visual analysis of CAN bus traffic injection using radial bar charts
M Kolomeets, A Chechulin, I Kotenko
2018 IEEE Industrial Cyber-Physical Systems (ICPS), 841-846, 2018
122018
Cyberattack detection in vehicles using characteristic functions, artificial neural networks, and visual analysis
Y Chevalier, F Fenzl, MV Kolomeec, R Rieke, AA Chechulin, C Krauss
Информатика и автоматизация 20 (4), 845-868, 2021
112021
Методика визуализации топологии компьютерной сети для мониторинга безопасности
МВ Коломеец, АА Чечулин, ИВ Котенко
Известия высших учебных заведений. Приборостроение 59 (10), 807-812, 2016
112016
ระบบไม่สามารถดำเนินการได้ในขณะนี้ โปรดลองใหม่อีกครั้งในภายหลัง
บทความ 1–20