Olga Gadyatskaya

Orcid: 0000-0002-3760-9165

According to our database1, Olga Gadyatskaya authored at least 42 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
FedFixer: Mitigating Heterogeneous Label Noise in Federated Learning.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Automated generation of attack trees with optimal shape and labelling.
CoRR, 2023

Meta Generative Flow Networks with Personalization for Task-Specific Adaptation.
CoRR, 2023

Evaluating Rule-Based Global XAI Malware Detection Methods.
Proceedings of the Network and System Security - 17th International Conference, 2023

2022
Secure Software Development Methodologies: A Multivocal Literature Review.
CoRR, 2022

How security professionals are being attacked: A study of malicious CVE proof of concept exploits in GitHub.
CoRR, 2022

Instrumentation Blueprints: Towards Combining Several Android Instrumentation Tools.
Proceedings of the Applied Cryptography and Network Security Workshops, 2022

2021
A Novel Approach for Attack Tree to Attack Graph Transformation: Extended Version.
CoRR, 2021

A Novel Approach for Attack Tree to Attack Graph Transformation.
Proceedings of the Risks and Security of Internet and Systems, 2021

2020
Fine-grained Code Coverage Measurement in Automated Black-box Android Testing.
ACM Trans. Softw. Eng. Methodol., 2020

Attribute evaluation on attack trees with incomplete information.
Comput. Secur., 2020

Dissecting Android Cryptocurrency Miners.
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020

2019
Attack-Tree Series: A Case for Dynamic Attack Tree Analysis.
Proceedings of the Graphical Models for Security - 6th International Workshop, 2019

2018
Fine-grained Code Coverage Measurement in Automated Black-box Android Testing.
CoRR, 2018

An Effective Android Code Coverage Tool.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

The Influence of Code Coverage Metrics on Automated Testing Efficiency in Android.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Refinement-Aware Generation of Attack Trees.
Proceedings of the Security and Trust Management - 13th International Workshop, 2017

New Directions in Attack Tree Research: Catching up with Industrial Needs.
Proceedings of the Graphical Models for Security - 4th International Workshop, 2017

2016
Small Changes, Big Changes: An Updated View on the Android Permission System.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016

Attack Trees for Practical Security Assessment: Ranking of Attack Scenarios with ADTool 2.0.
Proceedings of the Quantitative Evaluation of Systems - 13th International Conference, 2016

Evaluation of Resource-Based App Repackaging Detection in Android.
Proceedings of the Secure IT Systems - 21st Nordic Conference, NordSec 2016, Oulu, Finland, 2016

Using Attack-Defense Trees to Analyze Threats and Countermeasures in an ATM: A Case Study.
Proceedings of the Practice of Enterprise Modeling, 2016

Modelling Attack-defense Trees Using Timed Automata.
Proceedings of the Formal Modeling and Analysis of Timed Systems, 2016

Bridging Two Worlds: Reconciling Practical Risk Assessment Methodologies with Theory of Attack Trees.
Proceedings of the Graphical Models for Security - Third International Workshop, 2016

Towards Empirical Evaluation of Automated Risk Assessment Methods.
Proceedings of the Risks and Security of Internet and Systems, 2016

2015
How to Generate Security Cameras: Towards Defence Generation for Socio-Technical Systems.
Proceedings of the Graphical Models for Security - Second International Workshop, 2015

StaDynA: Addressing the Problem of Dynamic Code Updates in the Security Analysis of Android Applications.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015

Towards Black Box Testing of Android Apps.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
Security in the Firefox OS and Tizen Mobile Platforms.
Computer, 2014

FSquaDRA: Fast Detection of Repackaged Applications.
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014

An Empirical Study of the Technology Transfer Potential of EU Security and Trust R&D Projects.
Proceedings of the Cyber Security and Privacy - Third Cyber Security and Privacy EU Forum, 2014

2013
Load time code validation for mobile phone Java Cards.
J. Inf. Secur. Appl., 2013

MAP-REDUCE Runtime Enforcement of Information Flow Policies
CoRR, 2013

Enabling trusted stores for android.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
High-level algorithms and data structures requirements for security-by-contract on Java cards.
Int. J. Crit. Comput. Based Syst., 2012

Security-by-Contract for the OSGi Platform.
Proceedings of the Information Security and Privacy Research, 2012

Controlling Application Interactions on the Novel Smart Cards with Security-by-Contract.
Proceedings of the Formal Methods for Components and Objects, 2012

2011
A Load Time Policy Checker for Open Multi-application Smart Cards.
Proceedings of the POLICY 2011, 2011

Load Time Security Verification.
Proceedings of the Information Systems Security - 7th International Conference, 2011

2010
Can We Support Applications' Evolution in Multi-application Smart Cards by Security-by-Contract?
Proceedings of the Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 2010

Java Card Architecture for Autonomous Yet Secure Evolution of Smart Cards Applications.
Proceedings of the Information Security Technology for Applications, 2010

2008
Using EDP-Polynomials for Network Structure Optimization.
Proceedings of the Computational Science and Its Applications - ICCSA 2008, International Conference, Perugia, Italy, June 30, 2008


  Loading...