Author of the publication

The Hardware and Software Part of a Distributed Decentralized Systems Detection Malicious Software.

, , , , and . IntelITSIS, volume 3373 of CEUR Workshop Proceedings, page 437-451. CEUR-WS.org, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Proof-of-Activity Consensus Protocol Based on a Network's Active Nodes Indication., , , , and . IntelITSIS, volume 2623 of CEUR Workshop Proceedings, page 239-251. CEUR-WS.org, (2020)Methods for Detecting Software Implants in Corporate Networks., , , , and . IntelITSIS, volume 3675 of CEUR Workshop Proceedings, page 270-284. CEUR-WS.org, (2024)K-means Clustering of Honeynet Data with Unsupervised Representation Learning., and . IntelITSIS, volume 2853 of CEUR Workshop Proceedings, page 439-449. CEUR-WS.org, (2021)Method for Detecting Steganographic Changes in Images Using Machine Learning., , , , and . DESSERT, page 1-6. IEEE, (2023)Distributed System for Predicting Malicious Activity in Computer Networks., , , , and . IntelITSIS, volume 3373 of CEUR Workshop Proceedings, page 401-410. CEUR-WS.org, (2023)A method for detecting botnets in IT infrastructure using a neural network., , , , and . ICyberPhyS, volume 3736 of CEUR Workshop Proceedings, page 282-292. CEUR-WS.org, (2024)Self-organized distributed anomaly detection system in computer systems based on the principal components method., , , and . IntelITSIS, volume 3156 of CEUR Workshop Proceedings, page 329-351. CEUR-WS.org, (2022)Malware Detection Tool Based on Emulator State Analysis., , , and . IDAACS, page 135-140. IEEE, (2023)Malware Detection By Distributed Systems with Partial Centralization., , , and . IDAACS, page 265-270. IEEE, (2023)Method of Ensuring the Failure Resistance of Specialized Information Technologies Under the Influence of Malicious Software., , , and . IntelITSIS, volume 3156 of CEUR Workshop Proceedings, page 352-364. CEUR-WS.org, (2022)