Author of the publication

Self-organized distributed anomaly detection system in computer systems based on the principal components method.

, , , and . IntelITSIS, volume 3156 of CEUR Workshop Proceedings, page 329-351. CEUR-WS.org, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Proof-of-Activity Consensus Protocol Based on a Network's Active Nodes Indication., , , , and . IntelITSIS, volume 2623 of CEUR Workshop Proceedings, page 239-251. CEUR-WS.org, (2020)A graph-based vulnerability detection method., , , , and . IntelITSIS, volume 3675 of CEUR Workshop Proceedings, page 343-355. CEUR-WS.org, (2024)A Framework for Detection of MitM Cyberattacks in Smart Grid Networks Based on the Application of the Ensemble Process for Feature Selection., , , and . DESSERT, page 1-8. IEEE, (2023)Centralized distributed system for cyberattack detection in corporate network based on multifractal analysis., , , , and . IntelITSIS, volume 3156 of CEUR Workshop Proceedings, page 421-431. CEUR-WS.org, (2022)Detecting Software Malicious Implant Based on Anomalies Research on Local Area Networks., , , , and . IntelITSIS, volume 2623 of CEUR Workshop Proceedings, page 194-207. CEUR-WS.org, (2020)SVM-based Technique for Mobile Malware Detection., , , and . CMIS, volume 2353 of CEUR Workshop Proceedings, page 85-97. CEUR-WS.org, (2019)The Technique for Metamorphic Viruses' Detection Based on Its Obfuscation Features Analysis., , , and . ICTERI Workshops, volume 2104 of CEUR Workshop Proceedings, page 680-687. CEUR-WS.org, (2018)Approach for the unknown metamorphic virus detection., , , and . IDAACS, page 71-76. IEEE, (2017)Subsystem of anomaly detection in the Smart House system based on machine learning., , , , and . ICyberPhyS, volume 3736 of CEUR Workshop Proceedings, page 339-350. CEUR-WS.org, (2024)Detection and prediction of the vulnerabilities in software systems based on behavioral analysis with machine learning., , , , and . ICyberPhyS, volume 3736 of CEUR Workshop Proceedings, page 239-254. CEUR-WS.org, (2024)