Igor Kotenko
Igor Kotenko
http://comsec.spb.ru/kotenko/
Verified email at comsec.spb.ru - Homepage
Title
Cited by
Cited by
Year
A cyber attack modeling and impact assessment framework
I Kotenko, A Chechulin
2013 5th International Conference on Cyber Conflict (CYCON 2013), 1-24, 2013
1302013
Intrusion detection in unlabeled data with quarter-sphere support vector machines
P Laskov, C Schäfer, I Kotenko, KR Müller
PIK-praxis der Informationsverarbeitung und Kommunikation 27 (4), 228-236, 2004
1262004
Attacks against computer network: Formal grammar-based framework and simulation tool
V Gorodetski, I Kotenko
International Workshop on Recent Advances in Intrusion Detection, 219-238, 2002
1202002
Attack graph based evaluation of network security
I Kotenko, M Stepashkin
IFIP International Conference on Communications and Multimedia Security, 216-227, 2006
1152006
Multi-agent technologies for computer network security: Attack simulation, intrusion detection and intrusion detection learning
V Gorodetski, I Kotenko, O Karsaev
Comput. Syst. Sci. Eng. 18 (4), 191-200, 2003
812003
Attack modeling and security evaluation in SIEM systems
I Kotenko, A Chechulin
International Transactions on Systems Science and Applications 8, 129-147, 2012
752012
A methodology for the analysis and modeling of security threats and attacks for systems of embedded components
JF Ruiz, R Harjani, A Mana, V Desnitsky, I Kotenko, A Chechulin
2012 20th Euromicro International Conference on Parallel, Distributed and …, 2012
662012
Agent-based modeling and simulation of cyber-warfare between malefactors and security agents in Internet
I Kotenko
19th European Simulation Multiconference “Simulation in wider Europe, 2005
662005
Software development kit for multi-agent systems design and implementation
V Gorodetski, O Karsayev, I Kotenko, A Khabalov
International Workshop of Central and Eastern Europe on Multi-Agent Systems …, 2001
652001
Common framework for attack modeling and security evaluation in siem systems
I Kotenko, A Chechulin
2012 IEEE International Conference on Green Computing and Communications, 94-101, 2012
622012
Security analysis of information systems taking into account social engineering attacks
I Kotenko, M Stepashkin, E Doynikova
2011 19th International Euromicro Conference on Parallel, Distributed and …, 2011
622011
Agent-based modeling and simulation of botnets and botnet defense
I Kotenko, A Konovalov, A Shorov
Conference on Cyber Conflict. CCD COE Publications. Tallinn, Estonia, 21-44, 2010
602010
Malware detection by data mining techniques based on positionally dependent features
D Komashinskiy, I Kotenko
2010 18th Euromicro Conference on Parallel, Distributed and Network-based …, 2010
502010
Analytical visualization techniques for security information and event management
E Novikova, I Kotenko
2013 21st Euromicro International Conference on Parallel, Distributed, and …, 2013
492013
The ontological approach for SIEM data repository implementation
I Kotenko, O Polubelova, I Saenko
2012 IEEE International Conference on Green Computing and Communications …, 2012
472012
Agent-based simulation of DDOS attacks and defense mechanisms
I Kotenko, A Ulanov
International Journal of Computing 4 (2), 113-123, 2014
442014
Analyzing vulnerabilities and measuring security level at design and exploitation stages of computer network life cycle
I Kotenko, M Stepashkin
International Workshop on Mathematical Methods, Models, and Architectures …, 2005
442005
Attack Modelling and Security Evaluation for Security Information and Event Management.
IV Kotenko, A Chechulin, E Novikova
SECRYPT 2012, 391-394, 2012
412012
Active vulnerability assessment of computer networks by simulation of complex remote attacks
I Kotenko
2003 International Conference on Computer Networks and Mobile Computing …, 2003
402003
The multi-agent systems for computer network security assurance: frameworks and case studies
V Gorodetski, I Kotenko
Proceedings 2002 IEEE International Conference on Artificial Intelligence …, 2002
392002
The system can't perform the operation now. Try again later.
Articles 1–20