Oleg Savenko

Orcid: 0000-0002-4104-745X

According to our database1, Oleg Savenko authored at least 48 papers between 2011 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Intelligent Integrated System for Fruit Detection Using Multi-UAV Imaging and Deep Learning.
Sensors, March, 2024

2023
The Hardware and Software Part of a Distributed Decentralized Systems Detection Malicious Software.
Proceedings of the 4th International Workshop on Intelligent Information Technologies & Systems of Information Security, 2023

A Self-Organized Automated System to Control Unmanned Aerial Vehicles for Object Detection.
Proceedings of the 4th International Workshop on Intelligent Information Technologies & Systems of Information Security, 2023

Malware Detection By Distributed Systems with Partial Centralization.
Proceedings of the 12th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2023

Malware Detection Tool Based on Emulator State Analysis.
Proceedings of the 12th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2023

Apple Detection with Occlusions Using Modified YOLOv5-v1.
Proceedings of the 12th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2023

An Improved Fractional Model of an Electrochemical Capacitor with Accounting of Relaxation Phenomena.
Proceedings of the 12th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2023

State-based Sandbox Tool for Distributed Malware Detection with Avoid Techniques.
Proceedings of the 13th International Conference on Dependable Systems, 2023

A Framework for Detection of MitM Cyberattacks in Smart Grid Networks Based on the Application of the Ensemble Process for Feature Selection.
Proceedings of the 13th International Conference on Dependable Systems, 2023

Social Engineering Attacks Detection Approach.
Proceedings of the 13th International Conference on Dependable Systems, 2023

Method for Detecting Steganographic Changes in Images Using Machine Learning.
Proceedings of the 13th International Conference on Dependable Systems, 2023

2022
IoT Multi-Vector Cyberattack Detection Based on Machine Learning Algorithms: Traffic Features Analysis, Experiments, and Efficiency.
Algorithms, 2022

Centralized distributed system for cyberattack detection in corporate network based on multifractal analysis.
Proceedings of the 3rd International Workshop on Intelligent Information Technologies & Systems of Information Security, 2022

Botnet Detection Approach Based on DNS.
Proceedings of the 3rd International Workshop on Intelligent Information Technologies & Systems of Information Security, 2022

IoT Cyberattack Detection Approach Based on Energy Consumption Analysis.
Proceedings of the 12th International Conference on Dependable Systems, 2022

Evaluation the Efficiency of Information Technology of Big Data Intelligence Analysis and Processing.
Proceedings of the 6th International Conference on Computational Linguistics and Intelligent Systems (COLINS 2022). Volume I: Main Conference, 2022

2021
Implementation of Control by Parameters of Client Automated Workplaces of Specialized Information Systems for Neutralization malware.
Proceedings of the 2nd International Workshop on Intelligent Information Technologies & Systems of Information Security with CEUR-WS, 2021

Application of Multifactor Analysis for the Purpose of Detecting Malicious Software Implants of the Software in Local Computer Networks.
Proceedings of the 2nd International Workshop on Intelligent Information Technologies & Systems of Information Security with CEUR-WS, 2021

Automated Control Method for Charging Supercapacitors based on Relaxation Characteristics.
Proceedings of the 2021 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), 2021

Detection DNS Tunneling Botnets.
Proceedings of the 2021 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), 2021

Agglomerative Clustering of Data Collected by Honeypots.
Proceedings of the 2021 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), 2021

The Approach for IoT Malware Detection Based on Opcodes Sequences Pattern Mining.
Proceedings of the 2021 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), 2021

2020
Modeling the assessment of credit risk losses in banking.
Proceedings of the Selected Papers of the Special Edition of International Conference on Monitoring, 2020

Providing the Resilience and Survivability of Specialized Information Technology Across Corporate Computer Networks.
Proceedings of the 1st International Workshop on Intelligent Information Technologies & Systems of Information Security, 2020

Detecting Software Malicious Implant Based on Anomalies Research on Local Area Networks.
Proceedings of the 1st International Workshop on Intelligent Information Technologies & Systems of Information Security, 2020

An Android Malware Detection Method Based on CNN Mixed-Data Model.
Proceedings of the 16th International Conference on ICT in Education, 2020

Technique for Cyberattacks Detection Based on DNS Traffic Analysis.
Proceedings of the 16th International Conference on ICT in Education, 2020

A Cyberattacks Detection Technique Based on Evolutionary Algorithms.
Proceedings of the 11th IEEE International Conference on Dependable Systems, 2020

2019
Botnet Detection Approach for the Distributed Systems.
Proceedings of the 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2019

Dynamic Signature-based Malware Detection Technique Based on API Call Tracing.
Proceedings of the 15th International Conference on ICT in Education, 2019

BotGRABBER: SVM-Based Self-Adaptive System for the Network Resilience Against the Botnets' Cyberattacks.
Proceedings of the Computer Networks - 26th International Conference, 2019

2018
The Technique for Metamorphic Viruses' Detection Based on Its Obfuscation Features Analysis.
Proceedings of the 14th International Conference on ICT in Education, 2018

DDoS Botnet Detection Technique Based on the Use of the Semi-Supervised Fuzzy c-Means Clustering.
Proceedings of the 14th International Conference on ICT in Education, 2018

Distributed System for Detecting the Malware in LAN.
Proceedings of the Advances in Intelligent Systems and Computing III, 2018

Distributed Malware Detection System Based on Decentralized Architecture in Local Area Networks.
Proceedings of the Advances in Intelligent Systems and Computing III, 2018

Self-adaptive System for the Corporate Area Network Resilience in the Presence of Botnet Cyberattacks.
Proceedings of the Computer Networks - 25th International Conference, 2018

2017
Approach for the unknown metamorphic virus detection.
Proceedings of the 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2017

Metamorphic Viruses' Detection Technique Based on the Equivalent Functional Block Search.
Proceedings of the 13th International Conference on ICT in Education, 2017

Information Technology for Botnets Detection Based on Their Behaviour in the Corporate Area Network.
Proceedings of the Computer Networks - 24th International Conference, 2017

2016
Metamorphic Viruses Detection Technique Based on the the Modified Emulators.
Proceedings of the 12th International Conference on ICT in Education, 2016

Anti-evasion Technique for the Botnets Detection Based on the Passive DNS Monitoring and Active DNS Probing.
Proceedings of the Computer Networks - 23rd International Conference, 2016

2015
DNS-based anti-evasion technique for botnets detection.
Proceedings of the IEEE 8th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2015

A Technique for the Botnet Detection Based on DNS-Traffic Analysis.
Proceedings of the Computer Networks - 22nd International Conference, 2015

2014
A Technique for Detection of Bots Which Are Using Polymorphic Code.
Proceedings of the Computer Networks - 21st International Conference, 2014

2013
Botnet detection technique for corporate area network.
Proceedings of the IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems, 2013

Multi-agent Based Approach for Botnet Detection in a Corporate Area Network Using Fuzzy Logic.
Proceedings of the Computer Networks, 20th International Conference, 2013

2012
Multi-agent Based Approach of Botnet Detection in Computer Systems.
Proceedings of the Computer Networks - 19th International Conference, 2012

2011
The technique for computer systems Trojan diagnosis in the monitor mode.
Proceedings of the IEEE 6th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2011


  Loading...