Natalia G. Miloslavskaya

Orcid: 0000-0002-1231-1805

According to our database1, Natalia G. Miloslavskaya authored at least 68 papers between 2007 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Maturity Concept and Model Review.
Proceedings of the Information Systems and Technologies, 2022

Blockchain Redacting Algorithm with Storing Votes Inside the Chain.
Proceedings of the Information Systems and Technologies, 2022

How to Overcome Staff Shortage in Professionals for SOCs and NSICs.
Proceedings of the Information Security Education - Adapting to the Fourth Industrial Revolution, 2022

Open Source INTelligence Tools.
Proceedings of the 2022 Annual International Conference on Brain-Inspired Cognitive Architectures for Artificial Intelligence, 2022

Information Security Management Maturity Models.
Proceedings of the 2022 Annual International Conference on Brain-Inspired Cognitive Architectures for Artificial Intelligence, 2022

Security Architecture of Network Security Centers as Part of Modern Intranets.
Proceedings of the 2022 Annual International Conference on Brain-Inspired Cognitive Architectures for Artificial Intelligence, 2022

The Use of Virtual Reality Technologies in the Specialists' Training in the Field of Information Security.
Proceedings of the 2022 Annual International Conference on Brain-Inspired Cognitive Architectures for Artificial Intelligence, 2022

2021
Formation of General Professional Competencies in Academic Training of Information Security Professionals.
Proceedings of the Information Security Education for Cyber Resilience, 2021

A Brief History and Overview of WISE.
Proceedings of the Information Security Education for Cyber Resilience, 2021

2020
IoTBlockSIEM for information security incident management in the internet of things ecosystem.
Clust. Comput., 2020

On the Assessment of Compliance with the Requirements of Regulatory Documents to Ensure Information Security.
Proceedings of the Trends and Innovations in Information Systems and Technologies, 2020

Designing Competency Models for Cybersecurity Professionals for the Banking Sector.
Proceedings of the Information Security Education. Information Security in Action, 2020

Network Protection Tools for Network Security Intelligence Centers.
Proceedings of the 2020 Annual International Conference on Brain-Inspired Cognitive Architectures for Artificial Intelligence, 2020

A Brief Evolution of Network Protection Tools and Methods.
Proceedings of the 2020 Annual International Conference on Brain-Inspired Cognitive Architectures for Artificial Intelligence, 2020

Problems of Using Redactable Blockchain Technology.
Proceedings of the 2020 Annual International Conference on Brain-Inspired Cognitive Architectures for Artificial Intelligence, 2020

2019
Internet of Things: information security challenges and solutions.
Clust. Comput., 2019

New SIEM System for the Internet of Things.
Proceedings of the New Knowledge in Information Systems and Technologies, 2019

Standardization Issues for the Internet of Things.
Proceedings of the New Knowledge in Information Systems and Technologies, 2019

Big Data Analytics for Financial Crime Typologies.
Proceedings of the Big Data Innovations and Applications, 2019

Andragogy as a Scientific Basis for Training Professionals in Information Security.
Proceedings of the Information Security Education. Education in Proactive Information Security, 2019

Blockchain and Its Security: Ignore or Insert into Academic Training?
Proceedings of the Information Security Education. Education in Proactive Information Security, 2019

2018
Information security management in SOCs and SICs.
J. Intell. Fuzzy Syst., 2018

Designing blockchain-based SIEM 3.0 system.
Inf. Comput. Secur., 2018

Developing Hands-On Laboratory Works for the "Information Security Incident Management" Discipline.
Proceedings of the Information Security Education - Towards a Cybersecure Society, 2018

Forming the Abilities of Designing Information Security Maintenance Systems in the Implementation of Educational Programmes in Information Security.
Proceedings of the Information Security Education - Towards a Cybersecure Society, 2018

Applying Big Data Technologies to Detect Cases of Money Laundering and Counter Financing of Terrorism.
Proceedings of the 6th International Conference on Future Internet of Things and Cloud Workshops, 2018

Standardization of Ensuring Information Security for Big Data Technologies.
Proceedings of the 6th International Conference on Future Internet of Things and Cloud Workshops, 2018

Developing a Network Security Intelligence Center.
Proceedings of the Postproceedings of the 9th Annual International Conference on Biologically Inspired Cognitive Architectures, 2018

Network Security Intelligence Center as a combination of SIC and NOC.
Proceedings of the Postproceedings of the 9th Annual International Conference on Biologically Inspired Cognitive Architectures, 2018

2017
Analysis of Research on Specific Insider Information Security Threats.
Proceedings of the Recent Advances in Information Systems and Technologies, 2017

SOC- and SIC-Based Information Security Monitoring.
Proceedings of the Recent Advances in Information Systems and Technologies, 2017

"Network Security Intelligence" Educational and Research Center.
Proceedings of the Information Security Education for a Global Digital Society, 2017

ISO/IEC Competence Requirements for Information Security Professionals.
Proceedings of the Information Security Education for a Global Digital Society, 2017

Designing Degree Programmes for Bachelors and Masters in Information Security.
Proceedings of the Information Security Education for a Global Digital Society, 2017

Critical Analysis in the Research Area of Insider Threats.
Proceedings of the 5th IEEE International Conference on Future Internet of Things and Cloud, 2017

Ensuring Information Security for Internet of Things.
Proceedings of the 5th IEEE International Conference on Future Internet of Things and Cloud, 2017

DLP as an Integral Part of Network Security Intelligence Center.
Proceedings of the 5th IEEE International Conference on Future Internet of Things and Cloud, 2017

Security Intelligence Centers for Big Data Processing.
Proceedings of the 5th International Conference on Future Internet of Things and Cloud Workshops, 2017

Remote Attacks Taxonomy and their Verbal Indicators.
Proceedings of the 8th Annual International Conference on Biologically Inspired Cognitive Architectures, 2017

2016
Taxonomy for Unsecure Big Data Processing in Security Operations Centers.
Proceedings of the 4th IEEE International Conference on Future Internet of Things and Cloud Workshops, 2016

Application of Big Data, Fast Data, and Data Lake Concepts to Information Security Issues.
Proceedings of the 4th IEEE International Conference on Future Internet of Things and Cloud Workshops, 2016

State-Level Views on Professional Competencies in the Field of IoT and Cloud Information Security.
Proceedings of the 4th IEEE International Conference on Future Internet of Things and Cloud Workshops, 2016

Survey of Big Data Information Security.
Proceedings of the 4th IEEE International Conference on Future Internet of Things and Cloud Workshops, 2016

Security Operations Centers for Information Security Incident Management.
Proceedings of the 4th IEEE International Conference on Future Internet of Things and Cloud, 2016

Cybertrust in e-Learning Environment based on Network Time Synchronization.
Proceedings of the CSEDU 2016, 2016

Big Data, Fast Data and Data Lake Concepts.
Proceedings of the 7th Annual International Conference on Biologically Inspired Cognitive Architectures, 2016

Information Security and Expert's Knowledge Autoformalization.
Proceedings of the 7th Annual International Conference on Biologically Inspired Cognitive Architectures, 2016

Analysis of Intrusion Detection and Prevention Systems as Queueing Services.
Proceedings of the 30th International Conference on Advanced Information Networking and Applications Workshops, 2016

2015
Modeling of next-generation firewalls as queueing services.
Proceedings of the 8th International Conference on Security of Information and Networks, 2015

Secure e-Learning portal for teaching business continuity and information security management.
Proceedings of the 8th International Conference on Security of Information and Networks, 2015

On Experience of Using Distance Learning Technologies for Teaching Cryptology.
Proceedings of the Information Security Education Across the Curriculum, 2015

Professional Competencies Level Assessment for Training of Masters in Information Security.
Proceedings of the Information Security Education Across the Curriculum, 2015

Analysis of Hypoexponential Computing Services for Big Data Processing.
Proceedings of the 3rd International Conference on Future Internet of Things and Cloud, 2015

Unification of Graph Data Models for Heterogeneous Security Information Resources' Integration.
Proceedings of the 3rd International Conference on Future Internet of Things and Cloud, 2015

Information Security Theory for the Future Internet.
Proceedings of the 3rd International Conference on Future Internet of Things and Cloud, 2015

Problem of Trust in e-Learning Environment.
Proceedings of the CSEDU 2015, 2015

2014
Big Data Information Security Maintenance.
Proceedings of the 7th International Conference on Security of Information and Networks, 2014

Information Security Theory Development.
Proceedings of the 7th International Conference on Security of Information and Networks, 2014

Information Security Maintenance Issues for Big Security-Related Data.
Proceedings of the 2014 International Conference on Future Internet of Things and Cloud, 2014

Security Aspects for e-Learning Portals.
Proceedings of the CSEDU 2014, 2014

An Approach to Information Security Policy Modeling for Enterprise Networks.
Proceedings of the Communications and Multimedia Security, 2014

2013
"Business Continuity and Information Security Maintenance" Masters' Training Program.
Proceedings of the Information Assurance and Security Education and Training, 2013

2012
A concept of unification of network security policies.
Proceedings of the 5th International Conference of Security of Information and Networks, 2012

2010
Bachelor of information security: ("automated systems security profile").
Proceedings of the 3rd International Conference on Security of Information and Networks, 2010

2009
Ensuring information security controls for the Russian banking organizations.
Proceedings of the 2nd International Conference on Security of Information and Networks, 2009

Information security incident management process.
Proceedings of the 2nd International Conference on Security of Information and Networks, 2009

Information Security Specialist Training on the Basis of ISO/IEC 27002.
Proceedings of the Information Assurance and Security Education and Training, 2009

2007
Information Security Specialist Training for the Banking Sphere.
Proceedings of the Fifth World Conference on Information Security Education, 2007


  Loading...