Igor Kotenko
Igor Kotenko
http://comsec.spb.ru/kotenko/
Verified email at comsec.spb.ru - Homepage
Title
Cited by
Cited by
Year
A cyber attack modeling and impact assessment framework
I Kotenko, A Chechulin
2013 5th International Conference on Cyber Conflict (CYCON 2013), 1-24, 2013
1382013
Intrusion detection in unlabeled data with quarter-sphere support vector machines
P Laskov, C Schäfer, I Kotenko, KR Müller
Walter de Gruyter GmbH & Co. KG 27 (4), 228-236, 2004
1312004
Attacks against computer network: Formal grammar-based framework and simulation tool
V Gorodetski, I Kotenko
International Workshop on Recent Advances in Intrusion Detection, 219-238, 2002
1262002
Attack graph based evaluation of network security
I Kotenko, M Stepashkin
IFIP International Conference on Communications and Multimedia Security, 216-227, 2006
1242006
Multi-agent technologies for computer network security: Attack simulation, intrusion detection and intrusion detection learning
V Gorodetski, I Kotenko, O Karsaev
Comput. Syst. Sci. Eng. 18 (4), 191-200, 2003
862003
Attack modeling and security evaluation in SIEM systems
I Kotenko, A Chechulin
International Transactions on Systems Science and Applications 8, 129-147, 2012
822012
Common framework for attack modeling and security evaluation in SIEM systems
I Kotenko, A Chechulin
2012 IEEE International Conference on Green Computing and Communications, 94-101, 2012
712012
Agent-based modeling and simulation of cyber-warfare between malefactors and security agents in Internet
I Kotenko
19th European Simulation Multiconference “Simulation in wider Europe, 2005
672005
A methodology for the analysis and modeling of security threats and attacks for systems of embedded components
JF Ruiz, R Harjani, A Mana, V Desnitsky, I Kotenko, A Chechulin
2012 20th Euromicro International Conference on Parallel, Distributed and …, 2012
662012
Agent-based modeling and simulation of botnets and botnet defense
I Kotenko, A Konovalov, A Shorov
Conference on Cyber Conflict. CCD COE Publications. Tallinn, Estonia, 21-44, 2010
652010
Software development kit for multi-agent systems design and implementation
V Gorodetski, O Karsayev, I Kotenko, A Khabalov
International Workshop of Central and Eastern Europe on Multi-Agent Systems …, 2001
652001
Security analysis of information systems taking into account social engineering attacks
I Kotenko, M Stepashkin, E Doynikova
2011 19th International Euromicro Conference on Parallel, Distributed and …, 2011
642011
Analytical visualization techniques for security information and event management
E Novikova, I Kotenko
2013 21st Euromicro International Conference on Parallel, Distributed, and …, 2013
552013
The ontological approach for SIEM data repository implementation
I Kotenko, O Polubelova, I Saenko
2012 IEEE International Conference on Green Computing and Communications …, 2012
522012
Malware detection by data mining techniques based on positionally dependent features
D Komashinskiy, I Kotenko
2010 18th Euromicro Conference on Parallel, Distributed and Network-based …, 2010
522010
Analyzing vulnerabilities and measuring security level at design and exploitation stages of computer network life cycle
I Kotenko, M Stepashkin
International Workshop on Mathematical Methods, Models, and Architectures …, 2005
472005
The ontology of metrics for security evaluation and decision support in SIEM systems
I Kotenko, O Polubelova, I Saenko, E Doynikova
2013 International Conference on Availability, Reliability and Security, 638-645, 2013
442013
Attack Modelling and Security Evaluation for Security Information and Event Management.
IV Kotenko, A Chechulin, E Novikova
SECRYPT 2012, 391-394, 2012
442012
Categorisation of web pages for protection against inappropriate content in the internet
I Kotenko, A Chechulin, D Komashinsky
International Journal of Internet Protocol Technology 10 (1), 61-71, 2017
422017
Computer attack modeling and security evaluation based on attack graphs
I Kotenko, A Chechulin
2013 IEEE 7th International Conference on Intelligent Data Acquisition and …, 2013
422013
The system can't perform the operation now. Try again later.
Articles 1–20