Andrey Chechulin

Orcid: 0000-0001-7056-6972

According to our database1, Andrey Chechulin authored at least 75 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Experimental Evaluation: Can Humans Recognise Social Media Bots?
Big Data Cogn. Comput., March, 2024

From Detection to Dissection: Unraveling Bot Characteristics in the VKontakte Social Network.
Proceedings of the 16th International Conference on COMmunication Systems & NETworkS, 2024

Cybercrime Investigation Model.
Proceedings of the 16th International Conference on COMmunication Systems & NETworkS, 2024

2023
Social bot metrics.
Soc. Netw. Anal. Min., December, 2023

Two-model active learning approach for inappropriate information classification in social networks.
Int. J. Inf. Sec., December, 2023

Graph Visualization: Alternative Models Inspired by Bioinformatics.
Sensors, April, 2023

Trademark Similarity Evaluation Using a Combination of ViT and Local Features.
Inf., 2023

Vulnerability Categorization for Fast Multistep Attack Modelling.
Proceedings of the 33rd Conference of Open Innovations Association, 2023

2022
Security and Privacy Analysis of Smartphone-Based Driver Monitoring Systems from the Developer's Point of View.
Sensors, 2022

Threats Detection during Human-Computer Interaction in Driver Monitoring Systems.
Sensors, 2022

Multi-Aspect Based Approach to Attack Detection in IoT Clouds.
Sensors, 2022

Active learning approach for inappropriate information classification in social networks.
Proceedings of the 30th Euromicro International Conference on Parallel, 2022

Technique for Investigating Attacks on a Company's Reputation on a Social Media Platform.
Proceedings of the Intelligent Distributed Computing XV, 2022

2021
The application of the methodology for secure cyber-physical systems design to improve the semi-natural model of the railway infrastructure.
Microprocess. Microsystems, November, 2021

Design of Secure Microcontroller-Based Systems: Application to Mobile Robots for Perimeter Monitoring.
Sensors, 2021

Bot detection by friends graph in social networks.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2021

An Approach to Ranking the Sources of Information Dissemination in Social Networks.
Inf., 2021

Camouflaged bot detection using the friend list.
Proceedings of the 29th Euromicro International Conference on Parallel, 2021

Classification and Analysis of Vulnerabilities in Mobile Device Infrastructure Interfaces.
Proceedings of the Mobile Internet Security - 5th International Symposium, 2021

An Approach to Automated Assessment of the Image of a Territorial Entity in the Media Discourse of a Foreign States.
Proceedings of the Intelligent Distributed Computing XIV, 2021

A Technique for the Design of Abstract Models of Microcontroller-Based Physical Security Systems.
Proceedings of the Intelligent Distributed Computing XIV, 2021

Analysis of the Malicious Bots Market.
Proceedings of the 29th Conference of Open Innovations Association, 2021

2020
Design and verification of a mobile robot based on the integrated model of cyber-Physical systems.
Simul. Model. Pract. Theory, 2020

In-Vehicle Situation Monitoring for Potential Threats Detection Based on Smartphone Sensors.
Sensors, 2020

Social networks bot detection using Benford's law.
Proceedings of the SIN 2020: 13th International Conference on Security of Information and Networks, 2020

SEPAD - Security Evaluation Platform for Autonomous Driving.
Proceedings of the 28th Euromicro International Conference on Parallel, 2020

Augmented reality for visualizing security data for cybernetic and cyberphysical systems.
Proceedings of the 28th Euromicro International Conference on Parallel, 2020

2019
Social networks analysis by graph algorithms on the example of the VKontakte social network.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2019

Reference architecture for social networks graph analysis.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2019

Determination of Young Generation's Sensitivity to the Destructive Stimuli based on the Information in Social Networks.
J. Internet Serv. Inf. Secur., 2019

Towards Blockchain-based Multi-Agent Robotic Systems: Analysis, Classification and Applications.
CoRR, 2019

Access Control Visualization Using Triangular Matrices.
Proceedings of the 27th Euromicro International Conference on Parallel, 2019

Design and Verification Methodology for Secure and Distributed Cyber-Physical Systems.
Proceedings of the 10th IFIP International Conference on New Technologies, 2019

Adaptive Touch Interface: Application for Mobile Internet Security.
Proceedings of the Mobile Internet Security - 4th International Symposium, 2019

Analysis of Attack Actions on the Railway Infrastructure Based on the Integrated Model.
Proceedings of the Mobile Internet Security - 4th International Symposium, 2019

The Integrated Model of Secure Cyber-Physical Systems for Their Design and Verification.
Proceedings of the Intelligent Distributed Computing XIII, 2019

Development of the Complex Algorithm for Web Pages Classification to Detection Inappropriate Information on the Internet.
Proceedings of the Intelligent Distributed Computing XIII, 2019

ECU-Secure: Characteristic Functions for In-Vehicle Intrusion Detection.
Proceedings of the Intelligent Distributed Computing XIII, 2019

2018
AI- and Metrics-Based Vulnerability-Centric Cyber Security Assessment and Countermeasure Selection.
Proceedings of the Guide to Vulnerability Analysis for Computer Networks and Systems, 2018

A visual analytics approach for the cyber forensics based on different views of the network traffic.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2018

An Ontology-based Storage of Security Information.
Inf. Technol. Control., 2018

Monitoring and Counteraction to Malicious Influences in the Information Space of Social Networks.
Proceedings of the Social Informatics, 2018

Application of Image Classification Methods for Protection against Inappropriate Information in the Internet.
Proceedings of the IEEE International Conference on Internet of Things and Intelligence System, 2018

A technique for design of secure data transfer environment: Application for I2C protocol.
Proceedings of the IEEE Industrial Cyber-Physical Systems, 2018

Visual analysis of CAN bus traffic injection using radial bar charts.
Proceedings of the IEEE Industrial Cyber-Physical Systems, 2018

Comparative Study of Machine Learning Methods for In-Vehicle Intrusion Detection.
Proceedings of the Computer Security - ESORICS 2018 International Workshops, 2018

2017
Categorisation of web pages for protection against inappropriate content in the internet.
Int. J. Internet Protoc. Technol., 2017

Voronoi Maps for Planar Sensor Networks Visualization.
Proceedings of the Mobile Internet Security - Second International Symposium, 2017

Choosing Models for Security Metrics Visualization.
Proceedings of the Computer Network Security, 2017

Ontological Hybrid Storage for Security Data.
Proceedings of the Intelligent Distributed Computing XI - Proceedings of the 11th International Symposium on Intelligent Distributed Computing, 2017

Design lifecycle for secure cyber-physical systems based on embedded devices.
Proceedings of the 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2017

Analytical attack modeling and security assessment based on the common vulnerability scoring system.
Proceedings of the 20th Conference of Open Innovations Association, 2017

2016
Technique of Data Visualization: Example of Network Topology Display for Security Monitoring.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2016

Design Technique for Secure Embedded Devices: Application for Creation of Integrated Cyber-Physical Security System.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2016

Application of a Technique for Secure Embedded Device Design Based on Combining Security Components for Creation of a Perimeter Protection System.
Proceedings of the 24th Euromicro International Conference on Parallel, 2016

Visualization Model for Monitoring of Computer Networks Security Based on the Analogue of Voronoi Diagrams.
Proceedings of the Availability, Reliability, and Security in Information Systems, 2016

2015
Integrated Repository of Security Information for Network Security Evaluation.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2015

Methodological Primitives for Phased Construction of Data Visualization Models.
J. Internet Serv. Inf. Secur., 2015

Attack tree-based approach for real-time security event processing.
Autom. Control. Comput. Sci., 2015

Design of Integrated Vulnerabilities Database for Computer Networks Security Analysis.
Proceedings of the 23rd Euromicro International Conference on Parallel, 2015

Improving the Categorization of Web Sites by Analysis of Html-Tags Statistics to Block Inappropriate Content.
Proceedings of the Intelligent Distributed Computing IX - Proceedings of the 9th International Symposium on Intelligent Distributed Computing, 2015

Evaluation of text classification techniques for inappropriate web content blocking.
Proceedings of the IEEE 8th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2015

2014
Fast Network Attack Modeling and Security Evaluation based on Attack Graphs.
J. Cyber Secur. Mobil., 2014

Security Metrics Based on Attack Graphs for the Olympic Games Scenario.
Proceedings of the 22nd Euromicro International Conference on Parallel, 2014

Analysis and Evaluation of Web Pages Classification Techniques for Inappropriate Content Blocking.
Proceedings of the Advances in Data Mining. Applications and Theoretical Aspects, 2014

2013
Design and Implementation of a Hybrid Ontological-Relational Data Repository for SIEM Systems.
Future Internet, 2013

Dynamical Attack Simulation for Security Information and Event Management.
Proceedings of the Information Fusion and Geographic Information Systems, 2013

Computer attack modeling and security evaluation based on attack graphs.
Proceedings of the IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems, 2013

A Cyber Attack Modeling and Impact Assessment framework.
Proceedings of the 5th International Conference on Cyber Conflict, 2013

2012
Attack Modelling and Security Evaluation for Security Information and Event Management.
Proceedings of the SECRYPT 2012, 2012

A Methodology for the Analysis and Modeling of Security Threats and Attacks for Systems of Embedded Components.
Proceedings of the 20th Euromicro International Conference on Parallel, 2012

Configuration-Based Approach to Embedded Device Security.
Proceedings of the Computer Network Security, 2012

An Approach for Network Information Flow Analysis for Systems of Embedded Components.
Proceedings of the Computer Network Security, 2012

Common Framework for Attack Modeling and Security Evaluation in SIEM Systems.
Proceedings of the 2012 IEEE International Conference on Green Computing and Communications, 2012

2011
Combining of Scanning Protection Mechanisms in GIS and Corporate Information Systems.
Proceedings of the Information Fusion and Geographic Information Systems, 2011


  Loading...