Peter D. Zegzhda

Orcid: 0000-0002-2048-6189

According to our database1, Peter D. Zegzhda authored at least 42 papers between 2001 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Assessment of the Effectiveness of an Information Security System.
Autom. Control. Comput. Sci., December, 2023

Searching for Software Vulnerabilities Using an Ensemble of Algorithms for the Analysis of a Graph Representation of the Code.
Autom. Control. Comput. Sci., December, 2023

Data protection in heterogeneous big data systems.
J. Comput. Virol. Hacking Tech., September, 2023

2021
Operational Efficiency of Computer Networks under Conditions of Malicious Cyber Activity.
Autom. Control. Comput. Sci., 2021

2020
Approach to the Evaluation of the Efficiency of Information Security in Control Systems.
Autom. Control. Comput. Sci., 2020

A Model of Optimal Complexification of Measures Providing Information Security.
Autom. Control. Comput. Sci., 2020

Building an Adaptive System for Collecting and Preparing Data for Security Monitoring.
Autom. Control. Comput. Sci., 2020

Specification-Based Classification of Network Protocol Vulnerabilities.
Autom. Control. Comput. Sci., 2020

AI-based Security for the Smart Networks.
Proceedings of the SIN 2020: 13th International Conference on Security of Information and Networks, 2020

2019
Model and Method for Optimizing Computational Processes in Parallel Computing Systems.
Autom. Control. Comput. Sci., 2019

2018
A Use Case Analysis of Heterogeneous Semistructured Objects in Information Security Problems.
Autom. Control. Comput. Sci., 2018

Multifractal Analysis of Internet Backbone Traffic for Detecting Denial of Service Attacks.
Autom. Control. Comput. Sci., 2018

Actual Security Threats for Vehicular and Mobile Ad Hoc Networks.
Autom. Control. Comput. Sci., 2018

Threat Analysis of Cyber Security in Wireless Adhoc Networks Using Hybrid Neural Network Model.
Autom. Control. Comput. Sci., 2018

Application Model of Modern Artificial Neural Network Methods for the Analysis of Information Systems Security.
Autom. Control. Comput. Sci., 2018

An Approach to Vulnerability Searching of Integer Overflows in the Executable Program Code.
Autom. Control. Comput. Sci., 2018

The Problem of Innovative Development of Information Security Systems in the Transport Sector.
Autom. Control. Comput. Sci., 2018

Applying deep learning techniques for Android malware detection.
Proceedings of the 11th International Conference on Security of Information and Networks, 2018

Heterogeneous Semi-structured Objects Analysis.
Proceedings of the Intelligent Systems and Applications, 2018

Artificial swarm algorithm for VANET protection against routing attacks.
Proceedings of the IEEE Industrial Cyber-Physical Systems, 2018

Role-Based Access Control for Vehicular Adhoc Networks.
Proceedings of the 2018 IEEE International Black Sea Conference on Communications and Networking, 2018

2017
The use of an artificial neural network to detect automatically managed accounts in social networks.
Autom. Control. Comput. Sci., 2017

Indices of the effectiveness of information protection in an information interaction system for controlling complex distributed organizational objects.
Autom. Control. Comput. Sci., 2017

Modeling of information systems to their security evaluation.
Proceedings of the 10th International Conference on Security of Information and Networks, 2017

Detecting Android application malicious behaviors based on the analysis of control flows and data flows.
Proceedings of the 10th International Conference on Security of Information and Networks, 2017

Network security architectures for VANET.
Proceedings of the 10th International Conference on Security of Information and Networks, 2017

Integer overflow vulnerabilities detection in software binary code.
Proceedings of the 10th International Conference on Security of Information and Networks, 2017

2016
Technology of security services virtualization for high-speed computer networks.
Autom. Control. Comput. Sci., 2016

A risk-oriented approach to the control arrangement of security protection subsystems of information systems.
Autom. Control. Comput. Sci., 2016

Safe Integration of SIEM Systems with Internet of Things: Data Aggregation, Integrity Control, and Bioinspired Safe Routing.
Proceedings of the 9th International Conference on Security of Information and Networks, 2016

Software defined security for vehicular ad hoc networks.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2016

2015
Approach to the construction of the generalized functional-semantic cyber security model.
Autom. Control. Comput. Sci., 2015

Detection of anomalies in behavior of the software with usage of Markov chains.
Autom. Control. Comput. Sci., 2015

Automatic security management of computer systems.
Autom. Control. Comput. Sci., 2015

2012
Using Graph Theory for Cloud System Security Modeling.
Proceedings of the Computer Network Security, 2012

Security Modeling of Grid Systems Using Petri Nets.
Proceedings of the Computer Network Security, 2012

2010
Clarifying Integrity Control at the Trusted Information Environment.
Proceedings of the Computer Network Security, 2010

2006
Formal Verification of Security Model Using SPR Tool.
Comput. Artif. Intell., 2006

2005
Detection of the Operating System Configuration Vulnerabilities with Safety Evaluation Facility.
Proceedings of the Security in Information Systems, 2005

Vulnerabilities Detection in the Configurations of MS Windows Operating System.
Proceedings of the Computer Network Security, 2005

2003
Logical Resolving for Security Evaluation.
Proceedings of the Computer Network Security, 2003

2001
Secure Systems Design Technology.
Proceedings of the Information Assurance in Computer Networks: Methods, 2001


  Loading...