Oleg B. Makarevich

Orcid: 0000-0003-0066-8564

According to our database1, Oleg B. Makarevich authored at least 32 papers between 2001 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2019
TLS certificate as a sign of establishing a connection with the network Tor.
Proceedings of the 12th International Conference on Security of Information and Networks, 2019

Analysis of the initial security of the robotics system.
Proceedings of the 12th International Conference on Security of Information and Networks, 2019

Detection of Anomalies in the Robotic System Based on the Calculation of Kullback-Leibler Divergence.
Proceedings of the 2019 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2019

2018
Development of a Protection System for a Group of Mobile Robots, Taking into Account the Requirements of Foreign and Russian Legislation.
Proceedings of the 11th International Conference on Security of Information and Networks, 2018

Development of the Methodology for Testing the Security of Group Management System for Mobile Robots.
Proceedings of the 11th International Conference on Security of Information and Networks, 2018

Development of the Anomaly Detection Method for a Group of Mobile Robots.
Proceedings of the 11th International Conference on Security of Information and Networks, 2018

Evaluating and Detecting Internal Attacks in a Mobile Robotic Network.
Proceedings of the International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2018

2017
Analysis of ways to secure group control for autonomous mobile robots.
Proceedings of the 10th International Conference on Security of Information and Networks, 2017

A model of a secure electronic voting system based on blind intermediaries using russian cryptographic algorithms.
Proceedings of the 10th International Conference on Security of Information and Networks, 2017

A Trust Evaluation Method for Active Attack Counteraction in Wireless Sensor Networks.
Proceedings of the 2017 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2017

2016
Development of the Hierarchal Trust management System for Mobile Cluster-based Wireless Sensor Network.
Proceedings of the 9th International Conference on Security of Information and Networks, 2016

Methodology of Countering Attacks for Wireless Sensor Networks Based on Trust.
Proceedings of the International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2016

2015
Execution of data-dependent programs over encrypted data.
Proceedings of the 8th International Conference on Security of Information and Networks, 2015

The general model of secure computation system.
Proceedings of the 8th International Conference on Security of Information and Networks, 2015

Trust management system for mobile cluster-based wireless sensor network.
Proceedings of the 8th International Conference on Security of Information and Networks, 2015

An Energy-Efficient System of Counteraction Against Attacks in the Mobile Wireless Sensor Networks.
Proceedings of the 2015 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2015

2014
An effectiveness of application of <<Capture The Flag>> competitions concept within higher education (Student contribution).
Proceedings of the 7th International Conference on Security of Information and Networks, 2014

Symmetric Fully Homomorphic Encryption Using Decidable Matrix Equations.
Proceedings of the 7th International Conference on Security of Information and Networks, 2014

Instrumental System for Analysis of Information Systems Using Smart Cards Protection.
Proceedings of the 7th International Conference on Security of Information and Networks, 2014

2013
Digital camera identification system.
Proceedings of the 6th International Conference on Security of Information and Networks, 2013

The method of the information security risk assessment in cloud computing systems.
Proceedings of the 6th International Conference on Security of Information and Networks, 2013

Performance analysis of the developed mandatory access control system in the DBMS.
Proceedings of the 6th International Conference on Security of Information and Networks, 2013

Using quadrocopter as a pentest tool.
Proceedings of the 6th International Conference on Security of Information and Networks, 2013

Development of a secure cluster-based wireless sensor network model.
Proceedings of the 6th International Conference on Security of Information and Networks, 2013

2012
Methods of automated analysis of vendor specific implementation of stateful-filtration.
Proceedings of the 5th International Conference of Security of Information and Networks, 2012

2011
Corporate networks security evaluation based on attack graphs.
Proceedings of the 4th International Conference on Security of Information and Networks, 2011

2010
Digital camera identification based on rotated images.
Proceedings of the 3rd International Conference on Security of Information and Networks, 2010

Automated method for constructing of network traffic filtering rules.
Proceedings of the 3rd International Conference on Security of Information and Networks, 2010

2009
Digital sound card identification based on recording path imperfections.
Proceedings of the 2nd International Conference on Security of Information and Networks, 2009

Research and Education Activities of the Department of Security of Information Technologies of Taganrog Institute of Technology of the Southern Federal University in the Field of Information Security.
Proceedings of the 2nd International Conference on Security of Information and Networks, 2009

A model of mandatory access for current database management systems.
Proceedings of the 2nd International Conference on Security of Information and Networks, 2009

2001
Mechanisms of Parallel Computing Organization for NeuroCluster.
Proceedings of the Parallel Computing Technologies, 2001


  Loading...