Victor A. Skormin

According to our database1, Victor A. Skormin authored at least 32 papers between 1999 and 2017.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2017
Detection and Mitigation of Time Delay Injection Attacks on Industrial Control Systems with PLCs.
Proceedings of the Computer Network Security, 2017

Resident Security System for Government/Industry Owned Computers.
Proceedings of the Computer Network Security, 2017

2016
Unmanned Aerial Vehicle Security Using Recursive Parameter Estimation.
J. Intell. Robotic Syst., 2016

ICS security testbed with delay attack case study.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

2014
Cloud security auditing based on behavioural modelling.
Int. J. Bus. Process. Integr. Manag., 2014

2013
Cloud Security Auditing Based on Behavioral Modeling.
Proceedings of the IEEE Ninth World Congress on Services, 2013

Behavioral Modeling for Suspicious Process Detection in Cloud Computing Environments.
Proceedings of the 2013 IEEE 14th International Conference on Mobile Data Management, Milan, Italy, June 3-6, 2013, 2013

2012
Using Behavioral Modeling and Customized Normalcy Profiles as Protection against Targeted Cyber-Attacks.
Proceedings of the Computer Network Security, 2012

Control System with High Robust Stability Characteristics Based on Catastrophe Function.
Proceedings of the 17th IEEE International Conference on Engineering of Complex Computer Systems, 2012

Customized Normalcy Profiles for the Detection of Targeted Attacks.
Proceedings of the Applications of Evolutionary Computation, 2012

2011
Automatic functionality detection in behavior-based IDS.
Proceedings of the MILCOM 2011, 2011

Colored Petri nets as the enabling technology in intrusion detection systems.
Proceedings of the MILCOM 2011, 2011

Computer Network Testbed at Binghamton University.
Proceedings of the MILCOM 2011, 2011

2010
Expressive, Efficient and Obfuscation Resilient Behavior Based IDS.
Proceedings of the Computer Security, 2010

Behavioral Obfuscation in Malware and its Mitigation via Signature Generalization.
Proceedings of the 2010 International Conference on Security & Management, 2010

2009
Detection of Specific Semantic Functionalities, such as Self-Replication Mechanism, in Malware Using Colored Petri Nets.
Proceedings of the 2009 International Conference on Security & Management, 2009

2008
Detection of Worm Propagation Engines in the System Call Domain using Colored Petri Nets.
Proceedings of the 2008 IEEE International Performance, 2008

2007
Prevention of information attacks by run-time detection of self-replication in computer codes.
J. Comput. Secur., 2007

Large-scale Reconfigurable Virtual Testbed for Information Security Experiments.
Proceedings of the 3rd International ICST Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities, 2007

Non-Stationary Markov Models and Anomaly Propagation Analysis in IDS.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007

2003
A Pspice Optimal Design Tool Utilizing Genetic Optimization.
Proceedings of the IASTED International Conference on Modelling and Simulation (MS 2003), 2003

Detecting Malicious Codes by the Presence of Their "Gene of Self-replication".
Proceedings of the Computer Network Security, 2003

Biological Approach to System Information Security (BASIS): A Multi-agent Approach to Information Security.
Proceedings of the Multi-Agent Systems and Applications III, 2003

Immunocomputing - principles and applications.
Springer, ISBN: 978-0-387-95533-9, 2003

2002
Pattern recognition by immunocomputing.
Proceedings of the 2002 Congress on Evolutionary Computation, 2002

2001
BASIS: A Biological Approach to System Information Security.
Proceedings of the Information Assurance in Computer Networks: Methods, 2001

SVD-Based Approach to Transparent Embedding Data into Digital Images.
Proceedings of the Information Assurance in Computer Networks: Methods, 2001

Agent-Based Model of Computer Network Security System: A Case Study.
Proceedings of the Information Assurance in Computer Networks: Methods, 2001

High-performance electromechanical direct-drive actuators for flight vehicles.
Proceedings of the American Control Conference, 2001

2000
Integrated Multi-Agent Approach to Network Security Assurance: Models of Agents' Community.
Proceedings of the Information Security for Global Information Infrastructures, 2000

1999
Ontology-Based Multi-Agent Model of an Information Security System.
Proceedings of the New Directions in Rough Sets, 1999

Agent-based Model of Information Security System: Architecture and Framework for Coordinated Behavior Specification.
Proceedings of the 1st International Workshop of Central and Eastern Europe on Multi-Agent Systems, 1999


  Loading...