Andrey M. Dolgikh

According to our database1, Andrey M. Dolgikh authored at least 18 papers between 2008 and 2018.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
ACE: Advanced CIP Evaluator.
Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and PrivaCy, 2018

2017
iCrawl: A Visual High Interaction Web Crawler.
Proceedings of the Computer Network Security, 2017

Detection and Mitigation of Time Delay Injection Attacks on Industrial Control Systems with PLCs.
Proceedings of the Computer Network Security, 2017

Resident Security System for Government/Industry Owned Computers.
Proceedings of the Computer Network Security, 2017

2016
Unmanned Aerial Vehicle Security Using Recursive Parameter Estimation.
J. Intell. Robotic Syst., 2016

ICS security testbed with delay attack case study.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

2014
Cloud security auditing based on behavioural modelling.
Int. J. Bus. Process. Integr. Manag., 2014

2013
Cloud Security Auditing Based on Behavioral Modeling.
Proceedings of the IEEE Ninth World Congress on Services, 2013

Behavioral Modeling for Suspicious Process Detection in Cloud Computing Environments.
Proceedings of the 2013 IEEE 14th International Conference on Mobile Data Management, Milan, Italy, June 3-6, 2013, 2013

2012
Using Behavioral Modeling and Customized Normalcy Profiles as Protection against Targeted Cyber-Attacks.
Proceedings of the Computer Network Security, 2012

Customized Normalcy Profiles for the Detection of Targeted Attacks.
Proceedings of the Applications of Evolutionary Computation, 2012

2011
Automatic functionality detection in behavior-based IDS.
Proceedings of the MILCOM 2011, 2011

Colored Petri nets as the enabling technology in intrusion detection systems.
Proceedings of the MILCOM 2011, 2011

Computer Network Testbed at Binghamton University.
Proceedings of the MILCOM 2011, 2011

2010
Expressive, Efficient and Obfuscation Resilient Behavior Based IDS.
Proceedings of the Computer Security, 2010

Behavioral Obfuscation in Malware and its Mitigation via Signature Generalization.
Proceedings of the 2010 International Conference on Security & Management, 2010

2009
Detection of Specific Semantic Functionalities, such as Self-Replication Mechanism, in Malware Using Colored Petri Nets.
Proceedings of the 2009 International Conference on Security & Management, 2009

2008
Detection of Worm Propagation Engines in the System Call Domain using Colored Petri Nets.
Proceedings of the 2008 IEEE International Performance, 2008


  Loading...