Follow
Igor Kotenko
Igor Kotenko
http://comsec.spb.ru/kotenko/
Verified email at comsec.spb.ru - Homepage
Title
Cited by
Cited by
Year
A cyber attack modeling and impact assessment framework
I Kotenko, A Chechulin
2013 5th International Conference on Cyber Conflict (CYCON 2013), 1-24, 2013
1822013
Intrusion detection in unlabeled data with quarter-sphere support vector machines
P Laskov, C Schäfer, I Kotenko, KR Müller
Walter de Gruyter GmbH & Co. KG 27 (4), 228-236, 2004
1422004
Attack graph based evaluation of network security
I Kotenko, M Stepashkin
Communications and Multimedia Security: 10th IFIP TC-6 TC-11 International …, 2006
1382006
Attacks against computer network: Formal grammar-based framework and simulation tool
V Gorodetski, I Kotenko
International Workshop on Recent Advances in Intrusion Detection, 219-238, 2002
1342002
Framework for mobile Internet of Things security monitoring based on big data processing and machine learning
I Kotenko, I Saenko, A Branitskiy
IEEE Access 6, 72714-72723, 2018
982018
Attack modeling and security evaluation in SIEM systems
I Kotenko, A Chechulin
International Transactions on Systems Science and Applications 8, 129-147, 2012
972012
Multi-agent technologies for computer network security: Attack simulation, intrusion detection and intrusion detection learning
V Gorodetski, I Kotenko, O Karsaev
Comput. Syst. Sci. Eng. 18 (4), 191-200, 2003
942003
Agent-based modeling and simulation of cyber-warfare between malefactors and security agents in internet
I Kotenko
19th European Simulation Multiconference “Simulation in wider Europe, 2005
902005
Security analysis of information systems taking into account social engineering attacks
I Kotenko, M Stepashkin, E Doynikova
2011 19th International Euromicro Conference on Parallel, Distributed and …, 2011
822011
A methodology for the analysis and modeling of security threats and attacks for systems of embedded components
JF Ruiz, R Harjani, A Mana, V Desnitsky, I Kotenko, A Chechulin
2012 20th Euromicro International Conference on Parallel, Distributed and …, 2012
792012
Common framework for attack modeling and security evaluation in SIEM systems
I Kotenko, A Chechulin
2012 IEEE International Conference on Green Computing and Communications, 94-101, 2012
782012
Software development kit for multi-agent systems design and implementation
V Gorodetski, O Karsayev, I Kotenko, A Khabalov
International Workshop of Central and Eastern Europe on Multi-Agent Systems …, 2001
752001
Agent-based modeling and simulation of botnets and botnet defense
I Kotenko, A Konovalov, A Shorov
Conference on Cyber Conflict. CCD COE Publications. Tallinn, Estonia, 21-44, 2010
702010
The ontology of metrics for security evaluation and decision support in SIEM systems
I Kotenko, O Polubelova, I Saenko, E Doynikova
2013 International Conference on Availability, Reliability and Security, 638-645, 2013
692013
Security assessment of computer networks based on attack graphs and security events
I Kotenko, E Doynikova
Information and Communication Technology: Second IFIP TC5/8 International …, 2014
682014
Computer attack modeling and security evaluation based on attack graphs
I Kotenko, A Chechulin
2013 IEEE 7th International Conference on Intelligent Data Acquisition and …, 2013
642013
Malware detection by data mining techniques based on positionally dependent features
D Komashinskiy, I Kotenko
2010 18th Euromicro Conference on Parallel, Distributed and Network-based …, 2010
632010
Hybridization of computational intelligence methods for attack detection in computer networks
A Branitskiy, I Kotenko
Journal of Computational Science 23, 145-156, 2017
622017
Analytical visualization techniques for security information and event management
E Novikova, I Kotenko
2013 21st Euromicro International Conference on Parallel, Distributed, and …, 2013
602013
The ontological approach for SIEM data repository implementation
I Kotenko, O Polubelova, I Saenko
2012 IEEE International Conference on Green Computing and Communications …, 2012
602012
The system can't perform the operation now. Try again later.
Articles 1–20