Vasily Desnitsky

Orcid: 0000-0002-3748-5414

According to our database1, Vasily Desnitsky authored at least 22 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Experimental Evaluation: Can Humans Recognise Social Media Bots?
Big Data Cogn. Comput., March, 2024

2023
Graph Visualization: Alternative Models Inspired by Bioinformatics.
Sensors, April, 2023

Determination of the Transition Probability Matrix for an IoT Fuzzy Security Model.
Proceedings of the IEEE International Conference on Internet of Things and Intelligence Systems, 2023

Defect Detection in Industrial IoT-based Machines: Case of Small Training Dataset.
Proceedings of the IEEE International Conference on Internet of Things and Intelligence Systems, 2023

2022
Multi-Aspect Based Approach to Attack Detection in IoT Clouds.
Sensors, 2022

Simulation-based and Graph oriented Approach to Detection of Network Attacks.
Proceedings of the 11th Mediterranean Conference on Embedded Computing, 2022

2021
Simulation and assessment of battery depletion attacks on unmanned aerial vehicles for crisis management infrastructures.
Simul. Model. Pract. Theory, 2021

Combined Approach to Anomaly Detection in Wireless Sensor Networks on Example of Water Management System.
Proceedings of the 10th Mediterranean Conference on Embedded Computing, 2021

2019
Modeling and Evaluation of Battery Depletion Attacks on Unmanned Aerial Vehicles in Crisis Management Systems.
Proceedings of the Intelligent Distributed Computing XIII, 2019

Approach to Detection of Denial-of-Sleep Attacks in Wireless Sensor Networks on the Base of Machine Learning.
Proceedings of the Intelligent Distributed Computing XIII, 2019

2018
Monitoring and Counteraction to Malicious Influences in the Information Space of Social Networks.
Proceedings of the Social Informatics, 2018

Ensuring Availability of Wireless Mesh Networks for Crisis Management.
Proceedings of the Intelligent Distributed Computing XII, 2018

2017
Modeling and Analysis of IoT Energy Resource Exhaustion Attacks.
Proceedings of the Intelligent Distributed Computing XI - Proceedings of the 11th International Symposium on Intelligent Distributed Computing, 2017

2016
Design Technique for Secure Embedded Devices: Application for Creation of Integrated Cyber-Physical Security System.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2016

Automated design, verification and testing of secure systems with embedded devices based on elicitation of expert knowledge.
J. Ambient Intell. Humaniz. Comput., 2016

Application of a Technique for Secure Embedded Device Design Based on Combining Security Components for Creation of a Perimeter Protection System.
Proceedings of the 24th Euromicro International Conference on Parallel, 2016

2014
Expert Knowledge Based Design and Verification of Secure Systems with Embedded Devices.
Proceedings of the Availability, Reliability, and Security in Information Systems, 2014

2012
A Methodology for the Analysis and Modeling of Security Threats and Attacks for Systems of Embedded Components.
Proceedings of the 20th Euromicro International Conference on Parallel, 2012

Configuration-Based Approach to Embedded Device Security.
Proceedings of the Computer Network Security, 2012

An Approach for Network Information Flow Analysis for Systems of Embedded Components.
Proceedings of the Computer Network Security, 2012

2010
Security and Scalability of Remote Entrusting Protection.
Proceedings of the Computer Network Security, 2010

2009
Design of Entrusting Protocols for Software Protection.
Proceedings of the Information Fusion and Geographic Information Systems, 2009


  Loading...