Konstantin E. Izrailov

Orcid: 0000-0002-9412-5693

According to our database1, Konstantin E. Izrailov authored at least 13 papers between 2018 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
The Method and Software Tool for Identification of the Machine Code Architecture in Cyberphysical Devices.
J. Sens. Actuator Networks, February, 2023

2022
Static Analysis of Information Systems for IoT Cyber Security: A Survey of Machine Learning Approaches.
Sensors, 2022

Analytical Modeling for Identification of the Machine Code Architecture of Cyberphysical Devices in Smart Homes.
Sensors, 2022

2021
An Approach for Stego-Insider Detection Based on a Hybrid NoSQL Database.
J. Sens. Actuator Networks, 2021

Method and algorithms of visual audit of program interaction.
J. Internet Serv. Inf. Secur., 2021

Identifying characteristics of software vulnerabilities by their textual description using machine learning.
Proceedings of the 2021 World Automation Congress, 2021

Classification and Analysis of Vulnerabilities in Mobile Device Infrastructure Interfaces.
Proceedings of the Mobile Internet Security - 5th International Symposium, 2021

2020
Digital Cloud Environment: Present Challenges and Future Forecast.
Future Internet, 2020

Intellectual Method of Program Interactions Visualisation in Unix-like Systems for Information Security Purposes.
Proceedings of the 12th Majorov International Conference on Software Engineering and Computer Systems (MICSECS 2020), 2020

Detection of Stego-Insiders in Corporate Networks Based on a Hybrid NoSQL Database Model.
Proceedings of the ICFNDS '20: The 4th International Conference on Future Networks and Distributed Systems, 2020

Approach to combining different methods for detecting insiders.
Proceedings of the ICFNDS '20: The 4th International Conference on Future Networks and Distributed Systems, 2020

2018
Metric of vulnerability at the base of the life cycle of software representations.
Proceedings of the 20th International Conference on Advanced Communication Technology, 2018

Combine method of forecasting VANET cybersecurity for application of high priority way.
Proceedings of the 20th International Conference on Advanced Communication Technology, 2018


  Loading...