Follow
Vasily Desnitsky
Vasily Desnitsky
SPIIRAS
Verified email at comsec.spb.ru - Homepage
Title
Cited by
Cited by
Year
A methodology for the analysis and modeling of security threats and attacks for systems of embedded components
JF Ruiz, R Harjani, A Mana, V Desnitsky, I Kotenko, A Chechulin
2012 20th Euromicro International Conference on Parallel, Distributed and …, 2012
792012
Design technique for secure embedded devices: Application for creation of integrated cyber-physical security system.
V Desnitsky, D Levshun, A Chechulin, IV Kotenko
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 7 (2), 60-80, 2016
522016
Detection of anomalies in data for monitoring of security components in the Internet of Things
VA Desnitsky, IV Kotenko, SB Nogin
2015 XVIII International Conference on Soft Computing and Measurements (SCM …, 2015
372015
Configuration-based approach to embedded device security
V Desnitsky, I Kotenko, A Chechulin
Computer Network Security: 6th International Conference on Mathematical …, 2012
332012
Expert knowledge based design and verification of secure systems with embedded devices
V Desnitsky, I Kotenko
Availability, Reliability, and Security in Information Systems: IFIP WG 8.4 …, 2014
292014
Machine learning based approach to detection of anomalous data from sensors in cyber-physical water supply systems
AV Meleshko, VA Desnitsky, IV Kotenko
IOP conference series: materials science and engineering 709 (3), 033034, 2020
282020
Modeling and analysis of IoT energy resource exhaustion attacks
V Desnitsky, I Kotenko
Intelligent Distributed Computing XI, 263-270, 2018
262018
Combined design technique for secure embedded devices exemplified by a perimeter protection system
V Desnitsky, AA Chechulin, IV Kotenko, DS Levshun, MV Kolomeec
Informatics and Automation 48, 5-31, 2016
222016
An approach for network information flow analysis for systems of embedded components
A Chechulin, I Kotenko, V Desnitsky
Computer Network Security: 6th International Conference on Mathematical …, 2012
222012
Approach to detection of Denial-of-Sleep attacks in wireless sensor networks on the base of machine learning
A Balueva, V Desnitsky, I Ushakov
Intelligent Distributed Computing XIII, 350-355, 2020
212020
Modeling and analysis of security incidents for mobile communication mesh Zigbee-based network
VA Desnitsky, IV Kotenko
2017 XX IEEE International Conference on Soft Computing and Measurements …, 2017
212017
Application of a technique for secure embedded device design based on combining security components for creation of a perimeter protection system
V Desnitsky, A Chechulin, I Kotenko, D Levshun, M Kolomeec
2016 24th Euromicro International Conference on Parallel, Distributed, and …, 2016
202016
Security event analysis in XBee-based wireless mesh networks
VA Desnitsky, IV Kotenko
2018 IEEE Conference of Russian Young Researchers in Electrical and …, 2018
182018
Monitoring and counteraction to malicious influences in the information space of social networks
I Kotenko, I Saenko, A Chechulin, V Desnitsky, L Vitkova, A Pronoza
International Conference on Social Informatics, 159-167, 2018
172018
Simulation and assessment of battery depletion attacks on unmanned aerial vehicles for crisis management infrastructures
V Desnitsky, I Kotenko
Simulation Modelling Practice and Theory 107, 102244, 2021
152021
Modeling and evaluation of battery depletion attacks on unmanned aerial vehicles in crisis management systems
V Desnitsky, N Rudavin, I Kotenko
Intelligent Distributed Computing XIII, 323-332, 2020
152020
Protection mechanisms against energy depletion attacks in cyber-physical systems
VA Desnitsky, IV Kotenko, NN Rudavin
2019 IEEE Conference of Russian Young Researchers in Electrical and …, 2019
142019
Ensuring availability of wireless mesh networks for crisis management
V Desnitsky, I Kotenko, N Rudavin
Intelligent Distributed Computing XII, 344-353, 2018
132018
Automated design, verification and testing of secure systems with embedded devices based on elicitation of expert knowledge
V Desnitsky, I Kotenko
Journal of ambient intelligence and humanized computing 7, 705-719, 2016
132016
An abstract model for embedded systems and intruders
V Desnitsky, I Kotenko, A Chechulin
Proceedings-19th International Euromicro Conference on Parallel, Distributed …, 2011
132011
The system can't perform the operation now. Try again later.
Articles 1–20