Andrey Sapegin

According to our database1, Andrey Sapegin authored at least 16 papers between 2013 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2020
K-metamodes: frequency-and ensemble-based distributed k-modes clustering for security analytics.
Proceedings of the 19th IEEE International Conference on Machine Learning and Applications, 2020

2019
High-Speed Security Log Analytics Using Hybrid Outlier Detection.
PhD thesis, 2019

2017
Evaluation of in-memory storage engine for machine learning analysis of security events.
Concurr. Comput. Pract. Exp., 2017

Towards a system for complex analysis of security events in large-scale networks.
Comput. Secur., 2017

Guilt-by-Association: Detecting Malicious Entities via Graph Mining.
Proceedings of the Security and Privacy in Communication Networks, 2017

2015
Simulation user behavior on a security testbed using user behavior states graph.
Proceedings of the 8th International Conference on Security of Information and Networks, 2015

Poisson-Based Anomaly Detection for Identifying Malicious User Behaviour.
Proceedings of the Mobile, Secure, and Programmable Networking, 2015

Leveraging Event Structure for Adaptive Machine Learning on Big Data Landscapes.
Proceedings of the Mobile, Secure, and Programmable Networking, 2015

High-Speed Security Analytics Powered by In-Memory Machine Learning Engine.
Proceedings of the 14th International Symposium on Parallel and Distributed Computing, 2015

Parallel and distributed normalization of security events for instant attack analysis.
Proceedings of the 34th IEEE International Performance Computing and Communications Conference, 2015

Analyzing Boundary Device Logs on the In-memory Platform.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

Implementation of Data Security Requirements in a Web-based Application for Interactive Medical Documentation.
Proceedings of the HEALTHINF 2015, 2015

2014
Gathering and Analyzing Identity Leaks for Security Awareness.
Proceedings of the Technology and Practice of Passwords, 2014

2013
On the extent of correlation in BGP updates in the Internet and what it tells us about locality of BGP routing events.
Comput. Commun., 2013

Catch the Spike: On the Locality of Individual BGP Update Bursts.
Proceedings of the IEEE 9th International Conference on Mobile Ad-hoc and Sensor Networks, 2013

Hierarchical object log format for normalisation of security events.
Proceedings of the 9th International Conference on Information Assurance and Security, 2013


  Loading...