Nikolaj Goranin

Orcid: 0000-0002-2263-3947

According to our database1, Nikolaj Goranin authored at least 16 papers between 2012 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Malware Detection Using Convolutional Neural Network, A Deep Learning Framework: Comparative Analysis.
J. Internet Serv. Inf. Secur., November, 2022

Automated System-Level Anomaly Detection and Classification Using Modified Random Forest.
Proceedings of the 1st International Conference on AI in Cybersecurity, 2022

2021
The Application of Hough Transform and Canny Edge Detector Methods for the Visual Detection of Cumuliform Clouds.
Sensors, 2021

2020
Dynamic Expert System-Based Geographically Adapted Malware Risk Evaluation Method.
Int. J. Comput. Commun. Control, 2020

2019
Evaluation of Deep Learning Methods Efficiency for Malicious and Benign System Calls Classification on the AWSCTD.
Secur. Commun. Networks, 2019

Information Security Risk Assessment in Critical Infrastructure: A Hybrid MCDM Approach.
Informatica, 2019

Automated Expert System Knowledge Base Development Method for Information Security Risk Analysis.
Int. J. Comput. Commun. Control, 2019

Experimental Evaluation of Memory Capacity of Recurrent Neural Networks.
Balt. J. Mod. Comput., 2019

2018
Towards a Robust Method of Dataset Generation of Malicious Activity for Anomaly-Based HIDS Training and Presentation of AWSCTD Dataset.
Balt. J. Mod. Comput., 2018

Towards a Robust Method of Dataset Generation of Malicious Activity on a Windows-Based Operating System for Anomaly-Based HIDS Training.
Proceedings of the Joint Proceedings of Baltic DB&IS 2018 Conference Forum and Doctoral Consortium co-located with the 13th International Baltic Conference on Databases and Information Systems (Baltic DB&IS 2018), 2018

2017
High-Level Self-Sustaining Information Security Management Framework.
Balt. J. Mod. Comput., 2017

Improvement of Security Costs Evaluation Process by Using Data Automatically Captured from BPMN and EPC Models.
Proceedings of the Business Process Management Workshops, 2017

2016
Content Based Model Transformations: Solutions to Existing Issues with Application in Information Security.
Int. J. Comput. Commun. Control, 2016

2015
Modelling influence of Botnet features on effectiveness of DDoS attacks.
Secur. Commun. Networks, 2015

2013
Security Ontology for Adaptive Mapping of Security Standards.
Int. J. Comput. Commun. Control, 2013

2012
Specialized Genetic Algorithm Based Simulation Tool Designed For Malware Evolution Forecasting.
Ann. UMCS Informatica, 2012


  Loading...