Maxim Kolomeets

Orcid: 0000-0002-7873-2733

Affiliations:
  • Newcastle University, Newcastle Upon Tyne, UK


According to our database1, Maxim Kolomeets authored at least 24 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
From Detection to Dissection: Unraveling Bot Characteristics in the VKontakte Social Network.
Proceedings of the 16th International Conference on COMmunication Systems & NETworkS, 2024

2023
Social bot metrics.
Soc. Netw. Anal. Min., December, 2023

Complex online harms and the smart home: A scoping review.
Future Gener. Comput. Syst., December, 2023

Graph Visualization: Alternative Models Inspired by Bioinformatics.
Sensors, April, 2023

2022
Technique for Investigating Attacks on a Company's Reputation on a Social Media Platform.
Proceedings of the Intelligent Distributed Computing XV, 2022

2021
Bot detection by friends graph in social networks.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2021

Camouflaged bot detection using the friend list.
Proceedings of the 29th Euromicro International Conference on Parallel, 2021

Analysis of the Malicious Bots Market.
Proceedings of the 29th Conference of Open Innovations Association, 2021

Security Measuring System for IoT Devices.
Proceedings of the Computer Security. ESORICS 2021 International Workshops, 2021

2020
Augmented reality for visualizing security data for cybernetic and cyberphysical systems.
Proceedings of the 28th Euromicro International Conference on Parallel, 2020

2019
Social networks analysis by graph algorithms on the example of the VKontakte social network.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2019

Reference architecture for social networks graph analysis.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2019

Access Control Visualization Using Triangular Matrices.
Proceedings of the 27th Euromicro International Conference on Parallel, 2019

Adaptive Touch Interface: Application for Mobile Internet Security.
Proceedings of the Mobile Internet Security - 4th International Symposium, 2019

Approach to Identification and Analysis of Information Sources in Social Networks.
Proceedings of the Intelligent Distributed Computing XIII, 2019

2018
A visual analytics approach for the cyber forensics based on different views of the network traffic.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2018

Visual analysis of CAN bus traffic injection using radial bar charts.
Proceedings of the IEEE Industrial Cyber-Physical Systems, 2018

Comparative Study of Machine Learning Methods for In-Vehicle Intrusion Detection.
Proceedings of the Computer Security - ESORICS 2018 International Workshops, 2018

2017
Voronoi Maps for Planar Sensor Networks Visualization.
Proceedings of the Mobile Internet Security - Second International Symposium, 2017

Choosing Models for Security Metrics Visualization.
Proceedings of the Computer Network Security, 2017

2016
Technique of Data Visualization: Example of Network Topology Display for Security Monitoring.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2016

Application of a Technique for Secure Embedded Device Design Based on Combining Security Components for Creation of a Perimeter Protection System.
Proceedings of the 24th Euromicro International Conference on Parallel, 2016

Visualization Model for Monitoring of Computer Networks Security Based on the Analogue of Voronoi Diagrams.
Proceedings of the Availability, Reliability, and Security in Information Systems, 2016

2015
Methodological Primitives for Phased Construction of Data Visualization Models.
J. Internet Serv. Inf. Secur., 2015


  Loading...