Igor Saenko

Orcid: 0000-0002-9051-5272

Affiliations:
  • St. Petersburg Federal Research Center of the Russian Academy of Sciences (SPC RAS), Russia
  • St. Petersburg Institute for Informatics and Automation of the Russian Academy of Sciences (SPIIRAS), Russia


According to our database1, Igor Saenko authored at least 62 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Dataset Generation Methodology: Towards Application of Machine Learning in Industrial Water Treatment Security.
SN Comput. Sci., April, 2024

2023
Intelligent state assessment of complex autonomous objects based on wavelet analysis.
Eng. Appl. Artif. Intell., November, 2023

Ensuring SDN Resilience under the Influence of Cyber Attacks: Combining Methods of Topological Transformation of Stochastic Networks, Markov Processes, and Neural Networks.
Big Data Cogn. Comput., 2023

2022
Ensuring the survivability of embedded computer networks based on early detection of cyber attacks by integrating fractal analysis and statistical methods.
Microprocess. Microsystems, April, 2022

A Proactive Protection of Smart Power Grids against Cyberattacks on Service Data Transfer Protocols by Computational Intelligence Methods.
Sensors, 2022

An approach for selecting countermeasures against harmful information based on uncertainty management.
Comput. Sci. Inf. Syst., 2022

Towards Resilient and Efficient Big Data Storage: Evaluating a SIEM Repository Based on HDFS.
Proceedings of the 30th Euromicro International Conference on Parallel, 2022

Applying Machine Learning Methods to Detect Abnormal User Behavior in a University Data Center.
Proceedings of the Intelligent Distributed Computing XV, 2022

2021
Applying machine learning and parallel data processing for attack detection in IoT.
IEEE Trans. Emerg. Top. Comput., 2021

LSTM Neural Networks for Detecting Anomalies Caused by Web Application Cyber Attacks.
Proceedings of the New Trends in Intelligent Software Methodologies, Tools and Techniques, 2021

Situational Control of a Computer Network Security System in Conditions of Cyber Attacks.
Proceedings of the 14th International Conference on Security of Information and Networks, 2021

Detecting Anomalous Behavior of Users of Data Centers Based on the Application of Artificial Neural Networks.
Proceedings of the Artificial Intelligence - 19th Russian Conference, 2021

A technique for early detection of cyberattacks using the traffic self-similarity property and a statistical approach.
Proceedings of the 29th Euromicro International Conference on Parallel, 2021

An Approach to the Synthesis of a Neural Network System for Diagnosing Computer Incidents.
Proceedings of the Intelligent Distributed Computing XIV, 2021

2020
Machine Learning and Big Data Processing for Cybersecurity Data Analysis.
Proceedings of the Data Science in Cybersecurity and Cyberthreat Intelligence, 2020

The intelligent system for detection and counteraction of malicious and inappropriate information on the Internet.
AI Commun., 2020

Intelligent support for network administrator decisions based on combined neural networks.
Proceedings of the SIN 2020: 13th International Conference on Security of Information and Networks, 2020

Optimizing Secure Information Interaction in Distributed Computing Systems by the Sequential Concessions Method.
Proceedings of the 28th Euromicro International Conference on Parallel, 2020

Graph-based evaluation of probability of disclosing the network structure by targeted attacks.
Proceedings of the NOMS 2020, 2020

Selection of Countermeasures against Harmful Information based on the Assessment of Semantic Content of Information Objects in the Conditions of Uncertainty.
Proceedings of the International Conference on INnovations in Intelligent SysTems and Applications, 2020

2019
Hierarchical fuzzy situational networks for online decision-making: Application to telecommunication systems.
Knowl. Based Syst., 2019

An Approach for Intelligent Evaluation of the State of Complex Autonomous Objects Based on the Wavelet Analysis.
Proceedings of the Advancing Technology Industrialization Through Intelligent Software Methodologies, Tools and Techniques, 2019

Optimization of the cyber security system structure based on accounting of the prevented damage cost.
Proceedings of the 12th International Conference on Security of Information and Networks, 2019

Attack Detection in IoT Critical Infrastructures: A Machine Learning and Big Data Processing Approach.
Proceedings of the 27th Euromicro International Conference on Parallel, 2019

Access Control Visualization Using Triangular Matrices.
Proceedings of the 27th Euromicro International Conference on Parallel, 2019

An Approach to Creating an Intelligent System for Detecting and Countering Inappropriate Information on the Internet.
Proceedings of the Intelligent Distributed Computing XIII, 2019

An Approach to Intelligent Distributed Scanning and Analytical Processing of the Internet Inappropriate Information.
Proceedings of the 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2019

A role-base approach and a genetic algorithm for VLAN design in large critical infrastructures.
Proceedings of the Genetic and Evolutionary Computation Conference Companion, 2019

2018
Genetic Algorithms for Solving Problems of Access Control Design and Reconfiguration in Computer Networks.
ACM Trans. Internet Techn., 2018

Applying Big Data Processing and Machine Learning Methods for Mobile Internet of Things Security Monitoring.
J. Internet Serv. Inf. Secur., 2018

Framework for Mobile Internet of Things Security Monitoring Based on Big Data Processing and Machine Learning.
IEEE Access, 2018

Hierarchical Fuzzy Situational Networks for Online Decision Support in Distributed Cyber-Physical Systems.
Proceedings of the New Trends in Intelligent Software Methodologies, Tools and Techniques, 2018

Monitoring and Counteraction to Malicious Influences in the Information Space of Social Networks.
Proceedings of the Social Informatics, 2018

Implementation of Intelligent Agents for Network Traffic and Security Risk Analysis in Cyber-Physical Systems.
Proceedings of the 11th International Conference on Security of Information and Networks, 2018

Analytical modeling and assessment of cyber resilience on the base of stochastic networks conversion.
Proceedings of the 10th International Workshop on Resilient Networks Design and Modeling, 2018

Parallelization of Security Event Correlation Based on Accounting of Event Type Links.
Proceedings of the 26th Euromicro International Conference on Parallel, 2018

Applying Intelligent Agents for Anomaly Detection of Network Traffic in Internet of Things Networks.
Proceedings of the IEEE International Conference on Internet of Things and Intelligence System, 2018

Evolutionary Algorithms for Design of Virtual Private Networks.
Proceedings of the Intelligent Distributed Computing XII, 2018

Genetic algorithms for role mining in critical infrastructure data spaces.
Proceedings of the Genetic and Evolutionary Computation Conference Companion, 2018

2017
Parallel big data processing system for security monitoring in Internet of Things networks.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2017

Parallel Processing of Big Heterogeneous Data for Security Monitoring of IoT Networks.
Proceedings of the 25th Euromicro International Conference on Parallel, 2017

Administrating role-based access control by genetic algorithms.
Proceedings of the Genetic and Evolutionary Computation Conference, 2017

2016
An Approach to Aggregation of Security Events in Internet-of-Things Networks Based on Genetic Optimization.
Proceedings of the 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, 2016

Assessment of Computer Network Resilience Under Impact of Cyber Attacks on the Basis of Stochastic Networks Conversion.
Proceedings of the Mobile Internet Security - First International Symposium, 2016

Application of Hybrid Neural Networks for Monitoring and Forecasting Computer Networks States.
Proceedings of the Advances in Neural Networks - ISNN 2016, 2016

Reconfiguration of RBAC schemes by genetic algorithms.
Proceedings of the Intelligent Distributed Computing X - Proceedings of the 10th International Symposium on Intelligent Distributed Computing, 2016

Detection of traffic anomalies in multi-service networks based on a fuzzy logical inference.
Proceedings of the Intelligent Distributed Computing X - Proceedings of the 10th International Symposium on Intelligent Distributed Computing, 2016

Using Genetic Algorithms for Design and Reconfiguration of RBAC Schemes.
Proceedings of the 1st International Workshop on AI for Privacy and Security, 2016

2015
Improved genetic algorithms for solving the optimisation tasks for design of access control schemes in computer networks.
Int. J. Bio Inspired Comput., 2015

Countermeasure Security Risks Management in the Internet of Things Based on Fuzzy Logic Inference.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Reconfiguration of Access Schemes in Virtual Networks of the Internet of Things by Genetic Algorithms.
Proceedings of the Intelligent Distributed Computing IX - Proceedings of the 9th International Symposium on Intelligent Distributed Computing, 2015

The Genetic Approach for Design of Virtual Private Networks.
Proceedings of the 18th IEEE International Conference on Computational Science and Engineering, 2015

2014
Design of Virtual Local Area Network Scheme Based on Genetic Optimization and Visual Analysis.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2014

A Genetic Approach for Virtual Computer Network Design.
Proceedings of the Intelligent Distributed Computing VIII, 2014

2013
Design and Implementation of a Hybrid Ontological-Relational Data Repository for SIEM Systems.
Future Internet, 2013

Logical Inference Framework for Security Management in Geographical Information Systems.
Proceedings of the Information Fusion and Geographic Information Systems, 2013

The Ontology of Metrics for Security Evaluation and Decision Support in SIEM Systems.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
Data Repository for Security Information and Event Management in Service Infrastructures.
Proceedings of the SECRYPT 2012, 2012

Design and Performance Evaluation of Improved Genetic Algorithm for Role Mining Problem.
Proceedings of the 20th Euromicro International Conference on Parallel, 2012

The Ontological Approach for SIEM Data Repository Implementation.
Proceedings of the 2012 IEEE International Conference on Green Computing and Communications, 2012

2011
Genetic Algorithms for Role Mining Problem.
Proceedings of the 19th International Euromicro Conference on Parallel, 2011

2010
Genetic Optimization of Access Control Schemes in Virtual Local Area Networks.
Proceedings of the Computer Network Security, 2010


  Loading...