Igor Kotenko
Igor Kotenko
Verified email at comsec.spb.ru - Homepage
Cited by
Cited by
A cyber attack modeling and impact assessment framework
I Kotenko, A Chechulin
2013 5th International Conference on Cyber Conflict (CYCON 2013), 1-24, 2013
Intrusion detection in unlabeled data with quarter-sphere support vector machines
P Laskov, C Schäfer, I Kotenko, KR Müller
PIK-praxis der Informationsverarbeitung und Kommunikation 27 (4), 228-236, 2004
Attacks against computer network: Formal grammar-based framework and simulation tool
V Gorodetski, I Kotenko
International Workshop on Recent Advances in Intrusion Detection, 219-238, 2002
Attack graph based evaluation of network security
I Kotenko, M Stepashkin
IFIP International Conference on Communications and Multimedia Security, 216-227, 2006
Multi-agent technologies for computer network security: Attack simulation, intrusion detection and intrusion detection learning
V Gorodetski, I Kotenko, O Karsaev
Comput. Syst. Sci. Eng. 18 (4), 191-200, 2003
Attack modeling and security evaluation in SIEM systems
I Kotenko, A Chechulin
International Transactions on Systems Science and Applications 8, 129-147, 2012
Common framework for attack modeling and security evaluation in siem systems
I Kotenko, A Chechulin
2012 IEEE International Conference on Green Computing and Communications, 94-101, 2012
A methodology for the analysis and modeling of security threats and attacks for systems of embedded components
JF Ruiz, R Harjani, A Mana, V Desnitsky, I Kotenko, A Chechulin
2012 20th Euromicro International Conference on Parallel, Distributed and …, 2012
Agent-based modeling and simulation of cyber-warfare between malefactors and security agents in Internet
I Kotenko
19th European Simulation Multiconference “Simulation in wider Europe, 2005
Software development kit for multi-agent systems design and implementation
V Gorodetski, O Karsayev, I Kotenko, A Khabalov
International Workshop of Central and Eastern Europe on Multi-Agent Systems …, 2001
Security analysis of information systems taking into account social engineering attacks
I Kotenko, M Stepashkin, E Doynikova
2011 19th International Euromicro Conference on Parallel, Distributed and …, 2011
Agent-based modeling and simulation of botnets and botnet defense
I Kotenko, A Konovalov, A Shorov
Conference on Cyber Conflict. CCD COE Publications. Tallinn, Estonia, 21-44, 2010
Analytical visualization techniques for security information and event management
E Novikova, I Kotenko
2013 21st Euromicro International Conference on Parallel, Distributed, and …, 2013
Malware detection by data mining techniques based on positionally dependent features
D Komashinskiy, I Kotenko
2010 18th Euromicro Conference on Parallel, Distributed and Network-based …, 2010
The ontological approach for SIEM data repository implementation
I Kotenko, O Polubelova, I Saenko
2012 IEEE International Conference on Green Computing and Communications …, 2012
Agent-based simulation of DDOS attacks and defense mechanisms
I Kotenko, A Ulanov
International Journal of Computing 4 (2), 113-123, 2014
Attack Modelling and Security Evaluation for Security Information and Event Management.
IV Kotenko, A Chechulin, E Novikova
SECRYPT 2012, 391-394, 2012
Analyzing vulnerabilities and measuring security level at design and exploitation stages of computer network life cycle
I Kotenko, M Stepashkin
International Workshop on Mathematical Methods, Models, and Architectures …, 2005
Categorisation of web pages for protection against inappropriate content in the internet
I Kotenko, A Chechulin, D Komashinsky
International Journal of Internet Protocol Technology 10 (1), 61-71, 2017
Active vulnerability assessment of computer networks by simulation of complex remote attacks
I Kotenko
2003 International Conference on Computer Networks and Mobile Computing …, 2003
The system can't perform the operation now. Try again later.
Articles 1–20