Elena Sitnikova

Orcid: 0000-0001-7392-0383

According to our database1, Elena Sitnikova authored at least 35 papers between 2007 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
X-IIoTID: A Connectivity- and Device-agnostic Intrusion Dataset for Industrial Internet of Things.
Dataset, May, 2022

Privacy-preserving big data analytics for cyber-physical systems.
Wirel. Networks, 2022

X-IIoTID: A Connectivity-Agnostic and Device-Agnostic Intrusion Data Set for Industrial Internet of Things.
IEEE Internet Things J., 2022

2021
An Integrated Framework for Privacy-Preserving Based Anomaly Detection for Cyber-Physical Systems.
IEEE Trans. Sustain. Comput., 2021

Developing a Security Testbed for Industrial Internet of Things.
IEEE Internet Things J., 2021

Privacy-Preserving Schemes for Safeguarding Heterogeneous Data Sources in Cyber-Physical Systems.
IEEE Access, 2021

Asynchronous Peer-to-Peer Federated Capability-Based Targeted Ransomware Detection Model for Industrial IoT.
IEEE Access, 2021

How to define utility for use in practical wireless network resource trading platforms.
Proceedings of the IEEE International Conference on Communications Workshops, 2021

2020
A new network forensic framework based on deep learning for Internet of Things networks: A particle deep framework.
Future Gener. Comput. Syst., 2020

Privacy-Preserving Techniques for Protecting Large-Scale Data of Cyber-Physical Systems.
Proceedings of the 16th International Conference on Mobility, Sensing and Networking, 2020

2019
Targeted Ransomware: A New Cyber Threat to Edge System of Brownfield Industrial Internet of Things.
IEEE Internet Things J., 2019

Towards the development of realistic botnet dataset in the Internet of Things for network forensic analytics: Bot-IoT dataset.
Future Gener. Comput. Syst., 2019

Forensics and Deep Learning Mechanisms for Botnets in Internet of Things: A Survey of Challenges and Solutions.
IEEE Access, 2019

A system architecture for time-sensitive heterogeneous wireless distributed software-defined networks.
Proceedings of the 2019 Military Communications and Information Systems Conference, 2019

Toward a framework for assessing the cyber-worthiness of complex mission critical systems.
Proceedings of the 2019 Military Communications and Information Systems Conference, 2019

Leveraging Deep Learning Models for Ransomware Detection in the Industrial Internet of Things Environment.
Proceedings of the 2019 Military Communications and Information Systems Conference, 2019

An Efficient Intrusion Detection Model for Edge System in Brownfield Industrial Internet of Things.
Proceedings of the 3rd International Conference on Big Data and Internet of Things, 2019

Industrial Internet of Things Based Ransomware Detection using Stacked Variational Neural Network.
Proceedings of the 3rd International Conference on Big Data and Internet of Things, 2019

2018
Identification of malicious activities in industrial internet of things based on deep learning models.
J. Inf. Secur. Appl., 2018

A digital identity stack to improve privacy in the IoT.
Proceedings of the 4th IEEE World Forum on Internet of Things, 2018

2017
Probability Risk Identification Based Intrusion Detection System for SCADA Systems.
Proceedings of the Mobile Networks and Management - 9th International Conference, 2017

Towards Developing Network Forensic Mechanism for Botnet Activities in the IoT Based on Machine Learning Techniques.
Proceedings of the Mobile Networks and Management - 9th International Conference, 2017

Collaborative anomaly detection framework for handling big data of cloud computing.
Proceedings of the 2017 Military Communications and Information Systems Conference, 2017

Privacy preservation intrusion detection technique for SCADA systems.
Proceedings of the 2017 Military Communications and Information Systems Conference, 2017

2016
SCADA Systems Cyber Security for Critical Infrastructures: Case Studies in Multiple Sectors.
Int. J. Cyber Warf. Terror., 2016

2015
Studying SCADA Organisations Information Security Goals: An Integrated System Theory Approach.
Proceedings of the 19th Pacific Asia Conference on Information Systems, 2015

2014
Towards Developing SCADA Systems Security Measures for Critical Infrastructures against Cyber-Terrorist Attacks.
Proceedings of the ICT Systems Security and Privacy Protection, 2014

A strategic framework for managing internet security.
Proceedings of the 11th International Conference on Fuzzy Systems and Knowledge Discovery, 2014

Using integrated system theory approach to assess security for SCADA systems cyber security for critical infrastructures: A pilot study.
Proceedings of the 11th International Conference on Fuzzy Systems and Knowledge Discovery, 2014

2013
The Power of Hands-On Exercises in SCADA Cyber Security Education.
Proceedings of the Information Assurance and Security Education and Training, 2013

Development & expansion of an industrial control system security laboratory and an international research collaboration.
Proceedings of the Cyber Security and Information Intelligence, 2013

Advances in the Protection of Critical Infrastructure by Improvement in Industrial Control System Security.
Proceedings of the Eleventh Australasian Information Security Conference, 2013

2012
Experimental bifurcations of an Impact oscillator with SMA Constraint.
Int. J. Bifurc. Chaos, 2012

2009
The Development of a Generic Framework for the Forensic Analysis of SCADA and Process Control Systems.
Proceedings of the Forensics in Telecommunications, 2009

2007
Software and systems engineering process capability in the South Australian defence industry.
Innov. Syst. Softw. Eng., 2007


  Loading...