Mikhail Zolotukhin

Orcid: 0000-0001-8058-7902

According to our database1, Mikhail Zolotukhin authored at least 33 papers between 2011 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
On Attacking Future 5G Networks with Adversarial Examples: Survey.
Network, 2023

2022
On Assessing Vulnerabilities of the 5G Networks to Adversarial Examples.
IEEE Access, 2022

Black-box Adversarial Examples against Intelligent Beamforming in 5G Networks.
Proceedings of the IEEE Conference on Standards for Communications and Networking, 2022

2021
Curious SDN for network attack mitigation.
Proceedings of the 21st IEEE International Conference on Software Quality, 2021

Intelligent IDS Chaining for Network Attack Mitigation in SDN.
Proceedings of the 17th International Conference on Mobility, Sensing and Networking, 2021

2020
Reinforcement Learning for Attack Mitigation in SDN-enabled Networks.
Proceedings of the 6th IEEE Conference on Network Softwarization, 2020

Linear Approximation Based Compression Algorithms Efficiency to Compress Environmental Data Sets.
Proceedings of the Web, Artificial Intelligence and Network Applications, 2020

2018
On optimal deployment of low power nodes for high frequency next generation wireless systems.
Comput. Networks, 2018

On Artificial Intelligent Malware Tolerant Networking for IoT.
Proceedings of the IEEE Conference on Network Function Virtualization and Software Defined Networks, 2018

2017
Probabilistic Transition-Based Approach for Detecting Application-Layer DDoS Attacks in Encrypted Software-Defined Networks.
Proceedings of the Network and System Security - 11th International Conference, 2017

On Detection of Network-Based Co-residence Verification Attacks in SDN-Driven Clouds.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2017

Multi-hop relays for high frequency next generation wireless systems.
Proceedings of the 24th International Conference on Telecommunications, 2017

Simulation and performance analysis of frame structures for multi-hop relay systems.
Proceedings of the IEEE Conference on Standards for Communications and Networking, 2017

2016
On optimal placement of low power nodes for improved performance in heterogeneous networks.
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016

Weighted Fuzzy Clustering for Online Detection of Application DDoS Attacks in Encrypted Network Traffic.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2016

On adaptive access and relay link resource allocation for in-band deployments.
Proceedings of the International Symposium on Wireless Communication Systems, 2016

Increasing web service availability by detecting application-layer DDoS attacks in encrypted traffic.
Proceedings of the 23rd International Conference on Telecommunications, 2016

2015
Online detection of anomalous network flows with soft clustering.
Proceedings of the 7th International Conference on New Technologies, Mobility and Security, 2015

Data Mining Approach for Detection of DDoS Attacks Utilizing SSL/TLS Protocol.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2015

Analysis of Approaches to Internet Traffic Generation for Cyber Security Research and Exercise.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2015

Energy efficient resource allocation in heterogeneous software defined network: A reverse combinatorial auction approach.
Proceedings of the 2015 IEEE/CIC International Conference on Communications in China, 2015

2014
On optimal relay placement for improved performance in non-coverage limited scenarios.
Proceedings of the 17th ACM International Conference on Modeling, 2014

Analysis of HTTP Requests for Anomaly Detection of Web Attacks.
Proceedings of the IEEE 12th International Conference on Dependable, 2014

Detection of zero-day malware based on the analysis of opcode sequences.
Proceedings of the 11th IEEE Consumer Communications and Networking Conference, 2014

2013
Detection of Anomalous HTTP Requests Based on Advanced N-gram Model and Clustering Techniques.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networking, 2013

Support vector machine integrated with game-theoretic approach and genetic algorithm for the detection and classification of malware.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2013

2012
Growing Hierarchical Self-organising Maps for Online Anomaly Detection by using Network Logs.
Proceedings of the WEBIST 2012 - Proceedings of the 8th International Conference on Web Information Systems and Technologies, Porto, Portugal, 18, 2012

Growing Hierarchical Self-organizing Maps and Statistical Distribution Models for Online Detection of Web Attacks.
Proceedings of the Web Information Systems and Technologies - 8th International Conference, 2012

A Relay Deployment Mechanism for One Scenario of Cost-Effective Coverage Extension in IEEE 802.16j Networks.
Proceedings of the 5th International Conference on New Technologies, 2012

Phase Adjustment in HS-SFN for HSDPA.
Proceedings of the 5th International Conference on New Technologies, 2012

Online anomaly detection by using N-gram model and growing hierarchical self-organizing maps.
Proceedings of the 8th International Wireless Communications and Mobile Computing Conference, 2012

2011
Enhanced LMMSE equalizer for high-speed single frequency network in HSDPA.
Proceedings of the 2011 IEEE Swedish Communication Technologies Workshop, 2011

Optimal Relays Deployment for 802.16j Networks.
Proceedings of the Mobile Networks and Management - Third International ICST Conference, 2011


  Loading...