Follow
Maxim Kolomeets
Maxim Kolomeets
Other namesMaxim Kolomeec, Maksim Kalameyets, Максим Коломеец
Verified email at newcastle.ac.uk - Homepage
Title
Cited by
Cited by
Year
Comparative study of machine learning methods for in-vehicle intrusion detection
I Berger, R Rieke, M Kolomeets, A Chechulin, I Kotenko
International Workshop on Security and Privacy Requirements Engineering, 85-101, 2018
492018
Choosing models for security metrics visualization
M Kolomeec, G Gonzalez-Granadillo, E Doynikova, A Chechulin, ...
Computer Network Security: 7th International Conference on Mathematical …, 2017
412017
Обзор методологических примитивов для поэтапного построения модели визуализации данных
МВ Коломеец, АА Чечулин, ИВ Котенко
Информатика и автоматизация 5 (42), 232-257, 2015
332015
Комбинированная методика проектирования защищенных встроенных устройств на примере системы охраны периметра
ВА Десницкий, АА Чечулин, ИВ Котенко, ДС Левшун, МВ Коломеец
Информатика и автоматизация 48 (0), 5-31, 2016
312016
A visual analytics approach for the cyber forensics based on different views of the network traffic.
IV Kotenko, M Kolomeets, A Chechulin, Y Chevalier
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 9 (2), 57-73, 2018
302018
Technique of Data Visualization: Example of Network Topology Display for Security Monitoring.
M Kolomeec, A Chechulin, A Pronoza, IV Kotenko
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 7 (1), 58-78, 2016
282016
Combined design technique for secure embedded devices exemplified by a perimeter protection system
V Desnitsky, AA Chechulin, IV Kotenko, DS Levshun, MV Kolomeec
Informatics and Automation 48, 5-31, 2016
222016
Bot detection by friends graph in social networks.
M Kolomeets, A Chechulin, IV Kotenko
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 12 (2), 141-159, 2021
212021
Analysis of the malicious bots market
M Kolomeets, A Chechulin
2021 29th conference of open innovations association (FRUCT), 199-205, 2021
202021
Application of a technique for secure embedded device design based on combining security components for creation of a perimeter protection system
V Desnitsky, A Chechulin, I Kotenko, D Levshun, M Kolomeec
2016 24th Euromicro International Conference on Parallel, Distributed, and …, 2016
202016
Methodological Primitives for Phased Construction of Data Visualization Models
M Kolomeec, A Chechulin, I Kotenko
Journal of Internet Services and Information Security 5 (4), 60-84, 2015
182015
Access control visualization using triangular matrices
M Kolomeets, A Chechulin, I Kotenko, I Saenko
2019 27th Euromicro International Conference on Parallel, Distributed and …, 2019
152019
Visualization model for monitoring of computer networks security based on the analogue of voronoi diagrams
M Kolomeets, A Chechulin, I Kotenko
Availability, Reliability, and Security in Information Systems: IFIP WG 8.4 …, 2016
142016
Camouflaged bot detection using the friend list
M Kolomeets, O Tushkanova, D Levshun, A Chechulin
2021 29th Euromicro international conference on parallel, distributed and …, 2021
132021
Методика визуализации метрик кибербезопасности
МВ Коломеец, АА Чечулин, ЕВ Дойникова, ИВ Котенко
Известия высших учебных заведений. Приборостроение 61 (10), 873-880, 2018
132018
Social networks analysis by graph algorithms on the example of the VKontakte social network.
M Kolomeets, A Chechulin, IV Kotenko
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 10 (2), 55-75, 2019
112019
Approach to identification and analysis of information sources in social networks
L Vitkova, M Kolomeets
Intelligent Distributed Computing XIII, 285-293, 2020
102020
Методика визуализации топологии компьютерной сети для мониторинга безопасности
МВ Коломеец, АА Чечулин, ИВ Котенко
Известия высших учебных заведений. Приборостроение 59 (10), 807-812, 2016
102016
Visual analysis of CAN bus traffic injection using radial bar charts
M Kolomeets, A Chechulin, I Kotenko
2018 IEEE Industrial Cyber-Physical Systems (ICPS), 841-846, 2018
92018
Complex online harms and the smart home: A scoping review
S Olabode, R Owens, VN Zhang, J Copilah-Ali, M Kolomeets, H Wu, ...
Future Generation Computer Systems, 2023
82023
The system can't perform the operation now. Try again later.
Articles 1–20