Follow
Evgenia Novikova
Evgenia Novikova
снс, СПИИРАН
Verified email at comsec.spb.ru
Title
Cited by
Cited by
Year
Open-source federated learning frameworks for IoT: A comparative review and analysis
I Kholod, E Yanaki, D Fomichev, E Shalugin, E Novikova, E Filippov, ...
Sensors 21 (1), 167, 2020
1242020
Analytical visualization techniques for security information and event management
E Novikova, I Kotenko
2013 21st Euromicro International Conference on Parallel, Distributed, and …, 2013
602013
Attack Modelling and Security Evaluation for Security Information and Event Management.
IV Kotenko, A Chechulin, E Novikova
SECRYPT 2012, 391-394, 2012
482012
Visualization of security metrics for cyber situation awareness
I Kotenko, E Novikova
2014 Ninth International Conference on Availability, Reliability and …, 2014
432014
Attacker behaviour forecasting using methods of intelligent data analysis: A comparative review and prospects
E Doynikova, E Novikova, I Kotenko
Information 11 (3), 168, 2020
362020
Comparative review of the intrusion detection systems based on federated learning: Advantages and open challenges
E Fedorchenko, E Novikova, A Shulepov
Algorithms 15 (7), 247, 2022
232022
Anomaly detection in the HVAC system operation by a RadViz based visualization-driven approach
E Novikova, M Bestuzhev, I Kotenko
Computer Security: ESORICS 2019 International Workshops, CyberICPS, SECPRE …, 2020
232020
Detection of cyberattacks and anomalies in cyber-physical systems: Approaches, data sources, evaluation
O Tushkanova, D Levshun, A Branitskiy, E Fedorchenko, E Novikova, ...
Algorithms 16 (2), 85, 2023
212023
Visual analytics for detecting anomalous activity in mobile money transfer services
E Novikova, I Kotenko
Availability, Reliability, and Security in Information Systems: IFIP WG 8.4 …, 2014
202014
Vissecanalyzer: A visual analytics tool for network security assessment
I Kotenko, E Novikova
Security Engineering and Intelligence Informatics: CD-ARES 2013 Workshops …, 2013
202013
Federated learning for intrusion detection in the critical infrastructures: Vertically partitioned data use case
E Novikova, E Doynikova, S Golubev
Algorithms 15 (4), 104, 2022
152022
DDoS attacks detection in cloud computing using data mining techniques
K Borisenko, A Smirnov, E Novikova, A Shorov
Advances in Data Mining. Applications and Theoretical Aspects: 16th …, 2016
152016
Visualizing anomalous activity in the movement of critical infrastructure employees
ES Novikova, IN Murenin, AV Shorov
2017 IEEE Conference of Russian Young Researchers in Electrical and …, 2017
142017
Analysis of privacy-enhancing technologies in open-source federated learning frameworks for driver activity recognition
E Novikova, D Fomichov, I Kholod, E Filippov
Sensors 22 (8), 2983, 2022
132022
CPE and CVE based technique for software security risk assessment
R Ushakov, E Doynikova, E Novikova, I Kotenko
2021 11th IEEE International Conference on Intelligent Data Acquisition and …, 2021
132021
P2onto: making privacy policies transparent
E Novikova, E Doynikova, I Kotenko
International Workshop on the Security of Industrial Control Systems and …, 2020
132020
Interactive multi-view visualization for fraud detection in mobile money transfer services
E Novikova, I Kotenko, E Fedotov
International Journal of Mobile Computing and Multimedia Communications …, 2014
112014
Privacy policies of IoT devices: collection and analysis
M Kuznetsov, E Novikova, I Kotenko, E Doynikova
Sensors 22 (5), 1838, 2022
102022
Towards attacker attribution for risk analysis
E Doynikova, E Novikova, D Gaifulina, I Kotenko
International Conference on Risks and Security of Internet and Systems, 347-353, 2020
102020
Analysis of visualization techniques for malware detection
A Kartel, E Novikova, A Volosiuk
2020 IEEE Conference of Russian Young Researchers in Electrical and …, 2020
82020
The system can't perform the operation now. Try again later.
Articles 1–20