|
|
|
Publications in Math-Net.Ru |
Citations |
|
2021 |
| 1. |
Y. Chevalier, F. Fenzl, M. Kolomeets, R. Rieke, A. Chechulin, C. Krauss, “Cyberattack detection in vehicles using characteristic functions, artificial neural networks, and visual analysis”, Informatics and Automation, 20:4 (2021), 845–868 |
3
|
|
2020 |
| 2. |
D. Levshun, D. Gaifulina, A. Chechulin, I. Kotenko, “Problematic issues of information security of cyber-physical systems”, Tr. SPIIRAN, 19:5 (2020), 1050–1088 |
9
|
|
2018 |
| 3. |
A. A. Pronoza, L. A. Vitkova, A. A. Chechulin, I. V. Kotenko, D. V. Sakharov, “Methodology for disseminating information channels analysis in social networks”, Vestnik S.-Petersburg Univ. Ser. 10. Prikl. Mat. Inform. Prots. Upr., 14:4 (2018), 362–377 |
1
|
|
2016 |
| 4. |
A. V. Fedorchenko, D. S. Levshun, A. A. Chechulin, I. V. Kotenko, “An analysis of security event correlation techniques in SIEM-systems. Part 2”, Tr. SPIIRAN, 49 (2016), 208–225 |
4
|
| 5. |
V. Desnitsky, A. A. Chechulin, I. V. Kotenko, D. S. Levshun, M. V. Kolomeec, “Combined Design Technique for Secure Embedded Devices Exemplified by a Perimeter Protection System”, Tr. SPIIRAN, 48 (2016), 5–31 |
14
|
| 6. |
A. V. Fedorchenko, D. S. Levshun, A. A. Chechulin, I. V. Kotenko, “An Analysis of Security Event Correlation Techniques in Siem-Systems. Part 1”, Tr. SPIIRAN, 47 (2016), 5–27 |
7
|
| 7. |
A. A. Pronoza, A. A. Chechulin, I. V. Kotenko, “Mathematical Models of Visualization in SIEM Systems”, Tr. SPIIRAN, 46 (2016), 90–107 |
3
|
|
2015 |
| 8. |
M. V. Kolomeec, A. A. Chechulin, I. V. Kotenko, “Review of Methodological Primitives for the Phased Construction of Data Visualization Model”, Tr. SPIIRAN, 42 (2015), 232–257 |
8
|
|
2014 |
| 9. |
A. N. Noskov, A. A. Chechulin, D. A. Tarasova, “Investigation of Heuristic Approach to Attacks on the Telecommunications Nnetwork Detection Based on Data Mining Techniques”, Tr. SPIIRAN, 37 (2014), 208–224 |
1
|
|
2013 |
| 10. |
I. V. Kotenko, E. V. Doynikova, A. A. Chechulin, “Dynamical recalculation of the security metrics on the example of attack potentiality”, Tr. SPIIRAN, 30 (2013), 26–39 |
| 11. |
A. A. Chechulin, “Technique of rapid construction, modification and analysis of attack trees”, Tr. SPIIRAN, 26 (2013), 40–53 |
| 12. |
A. A. Chechulin, I. V. Kotenko, O. V. Polubelova, “Design of the ontology based data model for the network attack modeling system”, Tr. SPIIRAN, 26 (2013), 26–39 |
|
2012 |
| 13. |
I. V. Kotenko, I. B. Saenko, O. V. Polubelova, A. A. Chechulin, “Application of security information and event management technology for information security in critical infrastructures”, Tr. SPIIRAN, 20 (2012), 27–56 |
7
|
|
| Organisations |
|
|