Anna Epishkina

Orcid: 0000-0001-7681-0382

According to our database1, Anna Epishkina authored at least 20 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of six.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Historical notes on Russian cryptography.
J. Comput. Virol. Hacking Tech., June, 2024

2023
Covert channel limitation via special dummy traffic generating.
J. Comput. Virol. Hacking Tech., September, 2023

2020
Algorithm for Optimal and Complete Testing of Software and Hardware Data Security Tools.
Proceedings of the 2020 Annual International Conference on Brain-Inspired Cognitive Architectures for Artificial Intelligence, 2020

A Technique to Limit Hybrid Covert Channel Capacity via Random Increasing of Packets' Lengths.
Proceedings of the 2020 Annual International Conference on Brain-Inspired Cognitive Architectures for Artificial Intelligence, 2020

2019
Continuous Authentication of Smartphone Users via Swipes and Taps Analysis.
Proceedings of the European Intelligence and Security Informatics Conference, 2019

Mobile User Authentication Using Keystroke Dynamics.
Proceedings of the European Intelligence and Security Informatics Conference, 2019

Timing Covert Channels Detection Cases via Machine Learning.
Proceedings of the European Intelligence and Security Informatics Conference, 2019

Practical User and Entity Behavior Analytics Methods for Fraud Detection Systems in Online Banking: A Survey.
Proceedings of the Biologically Inspired Cognitive Architectures 2019, 2019

2018
A Technique to Test Non-Binary Random Number Generator.
Proceedings of the Postproceedings of the 9th Annual International Conference on Biologically Inspired Cognitive Architectures, 2018

One-Time Passwords: Resistance to Masquerade Attack.
Proceedings of the Postproceedings of the 9th Annual International Conference on Biologically Inspired Cognitive Architectures, 2018

2016
Packet Length Covert Channel Capacity Estimation.
Proceedings of the 6th International Conference on IT Convergence and Security, 2016

Random Delays to Limit Timing Covert Channel.
Proceedings of the 2016 European Intelligence and Security Informatics Conference, 2016

The Design of Integrity Monitoring and Reliability Verification System for Critical Information, Transmitted in Automatic Train Signaling System, Based on DMR-RUS Radio Channel.
Proceedings of the 7th Annual International Conference on Biologically Inspired Cognitive Architectures, 2016

Towards Approximation of Human's Perceptive Space on Photos, Videos and 3D Scenes.
Proceedings of the 7th Annual International Conference on Biologically Inspired Cognitive Architectures, 2016

2015
Study of countermeasures against covert channels in IP networks.
Autom. Control. Comput. Sci., 2015

Protection from binary and multi-symbol packet length covert channels.
Proceedings of the 8th International Conference on Security of Information and Networks, 2015

Covert Channels Parameters Evaluation Using the Information Theory Statements.
Proceedings of the 5th International Conference on IT Convergence and Security, 2015

A Technique to Limit Packet Length Covert Channels.
Proceedings of the KMIS 2015, 2015

A Traffic Padding to Limit Packet Size Covert Channels.
Proceedings of the 3rd International Conference on Future Internet of Things and Cloud, 2015

A random traffic padding to limit packet size covert channels.
Proceedings of the 2015 Federated Conference on Computer Science and Information Systems, 2015


  Loading...