Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Information Technology for Botnets Detection Based on Their Behaviour in the Corporate Area Network., , , , and . CN, volume 718 of Communications in Computer and Information Science, page 166-181. Springer, (2017)Method for identifying cyberattacks based on the use of social engineering over the phone., , , and . IntelITSIS, volume 3675 of CEUR Workshop Proceedings, page 318-329. CEUR-WS.org, (2024)Methods of improving security and resilience of VR systems' architecture., , , and . IntelITSIS, volume 3675 of CEUR Workshop Proceedings, page 285-304. CEUR-WS.org, (2024)A Cyberattacks Detection Technique Based on Evolutionary Algorithms., , , and . DESSERT, page 127-132. IEEE, (2020)Botnet Detection Approach for the Distributed Systems., , , and . IDAACS, page 406-411. IEEE, (2019)Method for Detecting Steganographic Changes in Images Using Machine Learning., , , , and . DESSERT, page 1-6. IEEE, (2023)Blockchain-based Deep Learning Algorithm for Detecting Malware., , , , and . IntelITSIS, volume 3373 of CEUR Workshop Proceedings, page 529-538. CEUR-WS.org, (2023)Technique for IoT Cyberattacks Detection Based on the Energy Consumption Analysis., , , , and . IntelITSIS, volume 2853 of CEUR Workshop Proceedings, page 514-526. CEUR-WS.org, (2021)Resilient Computer Systems Development for Cyberattacks Resistance., , , , and . IntelITSIS, volume 2853 of CEUR Workshop Proceedings, page 353-361. CEUR-WS.org, (2021)Dynamic Signature-based Malware Detection Technique Based on API Call Tracing., , , and . ICTERI Workshops, volume 2393 of CEUR Workshop Proceedings, page 633-643. CEUR-WS.org, (2019)