Dmitry Levshun

Orcid: 0000-0003-1898-6624

According to our database1, Dmitry Levshun authored at least 29 papers between 2016 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Exploring BERT for Predicting Vulnerability Categories in Device Configurations.
Proceedings of the 10th International Conference on Information Systems Security and Privacy, 2024

Selection of Machine Learning Methods for Keylogger Detection Based on Network Activity.
Proceedings of the 16th International Conference on COMmunication Systems & NETworkS, 2024

2023
Two-model active learning approach for inappropriate information classification in social networks.
Int. J. Inf. Sec., December, 2023

Detection of Cyberattacks and Anomalies in Cyber-Physical Systems: Approaches, Data Sources, Evaluation.
Algorithms, February, 2023

Trademark Similarity Evaluation Using a Combination of ViT and Local Features.
Inf., 2023

Vulnerability Categorization for Fast Multistep Attack Modelling.
Proceedings of the 33rd Conference of Open Innovations Association, 2023

2022
Security and Privacy Analysis of Smartphone-Based Driver Monitoring Systems from the Developer's Point of View.
Sensors, 2022

Active learning approach for inappropriate information classification in social networks.
Proceedings of the 30th Euromicro International Conference on Parallel, 2022

Sentiment Analysis of Social Network Posts for Detecting Potentially Destructive Impacts.
Proceedings of the Intelligent Distributed Computing XV, 2022

2021
The application of the methodology for secure cyber-physical systems design to improve the semi-natural model of the railway infrastructure.
Microprocess. Microsystems, November, 2021

Models, algorithms and methodology for design of microcontroller-based physical security systems protected from cyber-physical attacks. (Modèles algorithmes et méthodologie pour la conception de systèmes de sécurité physique basés sur des microcontrôleurs protégés des attaques cyber-physiques).
PhD thesis, 2021

Design of Secure Microcontroller-Based Systems: Application to Mobile Robots for Perimeter Monitoring.
Sensors, 2021

Camouflaged bot detection using the friend list.
Proceedings of the 29th Euromicro International Conference on Parallel, 2021

Classification and Analysis of Vulnerabilities in Mobile Device Infrastructure Interfaces.
Proceedings of the Mobile Internet Security - 5th International Symposium, 2021

A Technique for the Design of Abstract Models of Microcontroller-Based Physical Security Systems.
Proceedings of the Intelligent Distributed Computing XIV, 2021

Security Measuring System for IoT Devices.
Proceedings of the Computer Security. ESORICS 2021 International Workshops, 2021

2020
Design and verification of a mobile robot based on the integrated model of cyber-Physical systems.
Simul. Model. Pract. Theory, 2020

Social networks bot detection using Benford's law.
Proceedings of the SIN 2020: 13th International Conference on Security of Information and Networks, 2020

SEPAD - Security Evaluation Platform for Autonomous Driving.
Proceedings of the 28th Euromicro International Conference on Parallel, 2020

2019
Determination of Young Generation's Sensitivity to the Destructive Stimuli based on the Information in Social Networks.
J. Internet Serv. Inf. Secur., 2019

Design and Verification Methodology for Secure and Distributed Cyber-Physical Systems.
Proceedings of the 10th IFIP International Conference on New Technologies, 2019

Analysis of Attack Actions on the Railway Infrastructure Based on the Integrated Model.
Proceedings of the Mobile Internet Security - 4th International Symposium, 2019

The Integrated Model of Secure Cyber-Physical Systems for Their Design and Verification.
Proceedings of the Intelligent Distributed Computing XIII, 2019

The Common Approach to Determination of the Destructive Information Impacts and Negative Personal Tendencies of Young Generation Using the Neural Network Methods for the Internet Content Processing.
Proceedings of the Intelligent Distributed Computing XIII, 2019

2018
A technique for design of secure data transfer environment: Application for I2C protocol.
Proceedings of the IEEE Industrial Cyber-Physical Systems, 2018

2017
Method for Predicting Pixel Values in Background Areas in the Problem of Weighted Steganalysis in the Spatial Domain of Natural Images Under Small Payloads.
Proceedings of the Mobile Internet Security - Second International Symposium, 2017

Design lifecycle for secure cyber-physical systems based on embedded devices.
Proceedings of the 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2017

2016
Design Technique for Secure Embedded Devices: Application for Creation of Integrated Cyber-Physical Security System.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2016

Application of a Technique for Secure Embedded Device Design Based on Combining Security Components for Creation of a Perimeter Protection System.
Proceedings of the 24th Euromicro International Conference on Parallel, 2016


  Loading...