Artem S. Konoplev

According to our database1, Artem S. Konoplev authored at least 20 papers between 2012 and 2023.

Collaborative distances:
  • Dijkstra number2 of six.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Protection of Computational Machine Learning Models against Extraction Threat.
Autom. Control. Comput. Sci., December, 2023

2022
Generation of Synthetic Data for Honeypot Systems Using Deep Learning Methods.
Autom. Control. Comput. Sci., December, 2022

2021
Constructing the Model of an Information System for the Automatization of Penetration Testing.
Autom. Control. Comput. Sci., 2021

2020
Blockchain Based System Model for Assessment of Security against Threats Caused by Uneven Distribution of Computational Power.
Autom. Control. Comput. Sci., 2020

2019
Analysis of the Security of UEFI BIOS Embedded Software in Modern Intel-Based Computers.
Autom. Control. Comput. Sci., 2019

2018
A Blockchain Decentralized Public Key Infrastructure Model.
Autom. Control. Comput. Sci., 2018

Providing Stable Operation of Self-Organizing Cyber-Physical System via Adaptive Topology Management Methods Using Blockchain-Like Directed Acyclic Graph.
Autom. Control. Comput. Sci., 2018

Floating Genesis Block Enhancement for Blockchain Based Routing Between Connected Vehicles and Software-defined VANET Security Services.
Proceedings of the 11th International Conference on Security of Information and Networks, 2018

2017
The task of building a trusted computing environment on the Intel hardware platform.
Autom. Control. Comput. Sci., 2017

2016
Tasks of providing information security in distributed computing networks.
Autom. Control. Comput. Sci., 2016

Access control system for distributed computing networks.
Autom. Control. Comput. Sci., 2016

Approaches to protection of applications based on the TLS protocol against attacks using revoked certificates.
Autom. Control. Comput. Sci., 2016

Applying the group signature for entity authentication in distributed grid computing networks.
Autom. Control. Comput. Sci., 2016

Applying Virtualization Technology for the Construction of Trusted Executable Environment.
Proceedings of the 9th International Conference on Security of Information and Networks, 2016

2015
Access control method in distributed grid computing networks.
Autom. Control. Comput. Sci., 2015

Universal national security platform for distributed information and telecommunication systems.
Autom. Control. Comput. Sci., 2015

The use of virtualization technology in the dynamic analysis of software code.
Autom. Control. Comput. Sci., 2015

Steganographic methods of communications in distributed computing networks.
Proceedings of the 8th International Conference on Security of Information and Networks, 2015

2013
Security policy verification in grid systems.
Proceedings of the 6th International Conference on Security of Information and Networks, 2013

2012
Security Modeling of Grid Systems Using Petri Nets.
Proceedings of the Computer Network Security, 2012


  Loading...