Sergiy Lysenko

According to our database1, Sergiy Lysenko authored at least 23 papers between 2011 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2020
Spyware Detection Technique Based on Reinforcement Learning.
Proceedings of the 1st International Workshop on Intelligent Information Technologies & Systems of Information Security, 2020

Technique for IoT Cyberattacks Detection Based on DNS Traffic Analysis.
Proceedings of the 1st International Workshop on Intelligent Information Technologies & Systems of Information Security, 2020

Technique for Cyberattacks Detection Based on DNS Traffic Analysis.
Proceedings of the 16th International Conference on ICT in Education, 2020

A Cyberattacks Detection Technique Based on Evolutionary Algorithms.
Proceedings of the 11th IEEE International Conference on Dependable Systems, 2020

2019
Botnet Detection Approach for the Distributed Systems.
Proceedings of the 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2019

Dynamic Signature-based Malware Detection Technique Based on API Call Tracing.
Proceedings of the 15th International Conference on ICT in Education, 2019

BotGRABBER: SVM-Based Self-Adaptive System for the Network Resilience Against the Botnets' Cyberattacks.
Proceedings of the Computer Networks - 26th International Conference, 2019

SVM-based Technique for Mobile Malware Detection.
Proceedings of the Second International Workshop on Computer Modeling and Intelligent Systems (CMIS-2019), 2019

2018
The Technique for Metamorphic Viruses' Detection Based on Its Obfuscation Features Analysis.
Proceedings of the 14th International Conference on ICT in Education, 2018

DDoS Botnet Detection Technique Based on the Use of the Semi-Supervised Fuzzy c-Means Clustering.
Proceedings of the 14th International Conference on ICT in Education, 2018

Self-adaptive System for the Corporate Area Network Resilience in the Presence of Botnet Cyberattacks.
Proceedings of the Computer Networks - 25th International Conference, 2018

2017
Approach for the unknown metamorphic virus detection.
Proceedings of the 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2017

Metamorphic Viruses' Detection Technique Based on the Equivalent Functional Block Search.
Proceedings of the 13th International Conference on ICT in Education, 2017

Information Technology for Botnets Detection Based on Their Behaviour in the Corporate Area Network.
Proceedings of the Computer Networks - 24th International Conference, 2017

2016
Metamorphic Viruses Detection Technique Based on the the Modified Emulators.
Proceedings of the 12th International Conference on ICT in Education, 2016

Anti-evasion Technique for the Botnets Detection Based on the Passive DNS Monitoring and Active DNS Probing.
Proceedings of the Computer Networks - 23rd International Conference, 2016

2015
DNS-based anti-evasion technique for botnets detection.
Proceedings of the IEEE 8th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2015

A Technique for the Botnet Detection Based on DNS-Traffic Analysis.
Proceedings of the Computer Networks - 22nd International Conference, 2015

2014
A Technique for Detection of Bots Which Are Using Polymorphic Code.
Proceedings of the Computer Networks - 21st International Conference, 2014

2013
Botnet detection technique for corporate area network.
Proceedings of the IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems, 2013

Multi-agent Based Approach for Botnet Detection in a Corporate Area Network Using Fuzzy Logic.
Proceedings of the Computer Networks, 20th International Conference, 2013

2012
Multi-agent Based Approach of Botnet Detection in Computer Systems.
Proceedings of the Computer Networks - 19th International Conference, 2012

2011
The technique for computer systems Trojan diagnosis in the monitor mode.
Proceedings of the IEEE 6th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2011


  Loading...