Author of the publication

Resilient Computer Systems Development for Cyberattacks Resistance.

, , , , and . IntelITSIS, volume 2853 of CEUR Workshop Proceedings, page 353-361. CEUR-WS.org, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Anti-evasion Technique for the Botnets Detection Based on the Passive DNS Monitoring and Active DNS Probing., , , , and . CN, volume 608 of Communications in Computer and Information Science, page 83-95. Springer, (2016)SVM-based Technique for Mobile Malware Detection., , , and . CMIS, volume 2353 of CEUR Workshop Proceedings, page 85-97. CEUR-WS.org, (2019)Technique for IoT Cyberattacks Detection Based on the Energy Consumption Analysis., , , , and . IntelITSIS, volume 2853 of CEUR Workshop Proceedings, page 514-526. CEUR-WS.org, (2021)Resilient Computer Systems Development for Cyberattacks Resistance., , , , and . IntelITSIS, volume 2853 of CEUR Workshop Proceedings, page 353-361. CEUR-WS.org, (2021)Information Technology for Botnets Detection Based on Their Behaviour in the Corporate Area Network., , , , and . CN, volume 718 of Communications in Computer and Information Science, page 166-181. Springer, (2017)A Cyberattacks Detection Technique Based on Evolutionary Algorithms., , , and . DESSERT, page 127-132. IEEE, (2020)Agent-Oriented Information Technology for Assessing the Initial Stages of the Software Life Cycle., , , and . ICTERI Workshops, volume 2393 of CEUR Workshop Proceedings, page 617-632. CEUR-WS.org, (2019)DNS-based anti-evasion technique for botnets detection., , , , and . IDAACS, page 453-458. IEEE, (2015)DDoS Botnet Detection Technique Based on the Use of the Semi-Supervised Fuzzy c-Means Clustering., , and . ICTERI Workshops, volume 2104 of CEUR Workshop Proceedings, page 688-695. CEUR-WS.org, (2018)The Approach for IoT Malware Detection Based on Opcodes Sequences Pattern Mining., , , , , , and . IDAACS, page 779-784. IEEE, (2021)