The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Igor V. Kotenko: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Igor V. Kotenko
    Teamwork of Hackers-Agents: Modeling and Simulation of Coordinated Distributed Attacks on Computer Networks. [Citation Graph (0, 0)][DBLP]
    CEEMAS, 2003, pp:464-474 [Conf]
  2. Igor V. Kotenko
    Application of Hybrid Agent-Based Technology for Design of Telecommunication Systems. [Citation Graph (0, 0)][DBLP]
    CEEMAS, 1999, pp:- [Conf]
  3. Vladimir I. Gorodetski, Oleg Karsaev, Igor V. Kotenko, Alexey Khabalov
    Software Development Kit for Multi-agent Systems Design and Implementation. [Citation Graph (0, 0)][DBLP]
    CEEMAS, 2001, pp:121-130 [Conf]
  4. Vladimir I. Gorodetski, Igor V. Kotenko, Leonard J. Popyack, Victor A. Skormin
    Agent-based Model of Information Security System: Architecture and Framework for Coordinated Behavior Specification. [Citation Graph (0, 0)][DBLP]
    CEEMAS, 1999, pp:- [Conf]
  5. Igor V. Kotenko, Mikhail Stepashkin
    Attack Graph Based Evaluation of Network Security. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2006, pp:216-227 [Conf]
  6. Igor V. Kotenko, Alexander Ulanov
    Agent Teams in Cyberspace: Security Guards in the Global Internet. [Citation Graph (0, 0)][DBLP]
    CW, 2006, pp:133-140 [Conf]
  7. Pavel Laskov, Christin Schäfer, Igor V. Kotenko
    Intrusion detection in unlabeled data with quarter-sphere Support Vector Machines. [Citation Graph (0, 0)][DBLP]
    DIMVA, 2004, pp:71-82 [Conf]
  8. Igor V. Kotenko
    Conflict Resolution in Computer-Supported Cooperative Design. [Citation Graph (0, 0)][DBLP]
    EWHCI, 1994, pp:152-163 [Conf]
  9. Igor V. Kotenko, Alexey Alexeev, Evgeny Man'kov
    Formal Framework for Modeling and Simulation of DDoS Attacks Based on Teamwork of Hackers-Agents. [Citation Graph (0, 0)][DBLP]
    IAT, 2003, pp:507-510 [Conf]
  10. Igor V. Kotenko, Alexander Ulanov
    Simulation of Internet DDoS Attacks and Defense. [Citation Graph (0, 0)][DBLP]
    ISC, 2006, pp:327-342 [Conf]
  11. Igor V. Kotenko, Evgeny Man'kov
    Experiments with Simulation of Attacks against Computer Networks. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2003, pp:183-194 [Conf]
  12. Igor V. Kotenko, Mikhail Stepashkin
    Analyzing Vulnerabilities and Measuring Security Level at Design and Exploitation Stages of Computer Network Life Cycle. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2005, pp:311-324 [Conf]
  13. Artem Tishkov, Igor V. Kotenko, Ekaterina Sidelnikova
    Security Checker Architecture for Policy-Based Security Management. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2005, pp:460-465 [Conf]
  14. Vladimir I. Gorodetski, Oleg Karsaev, Alexey Khabalov, Igor V. Kotenko, Leonard J. Popyack, Victor A. Skormin
    Agent-Based Model of Computer Network Security System: A Case Study. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2001, pp:39-50 [Conf]
  15. Vladimir I. Gorodetski, Igor V. Kotenko
    Attacks Against Computer Network: Formal Grammar-Based Framework and Simulation Tool. [Citation Graph (0, 0)][DBLP]
    RAID, 2002, pp:219-238 [Conf]
  16. Vladimir I. Gorodetski, Leonard J. Popyack, Igor V. Kotenko, Victor A. Skormin
    Ontology-Based Multi-Agent Model of an Information Security System. [Citation Graph (0, 0)][DBLP]
    RSFDGrC, 1999, pp:528-532 [Conf]
  17. Vladimir I. Gorodetski, Igor V. Kotenko, Victor A. Skormin
    Integrated Multi-Agent Approach to Network Security Assurance: Models of Agents' Community. [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:291-300 [Conf]
  18. Igor V. Kotenko, Mikhail Stepashkin
    Network Security Evaluation Based on Simulation of Malfactor's Behavior. [Citation Graph (0, 0)][DBLP]
    SECRYPT, 2006, pp:339-344 [Conf]
  19. Igor V. Kotenko, Alexander Ulanov
    The Software Environment for Multi-agent Simulation of Defense Mechanisms against DDoS Attacks. [Citation Graph (0, 0)][DBLP]
    CIMCA/IAWTIC, 2005, pp:283-289 [Conf]
  20. Vladimir I. Gorodetski, Igor V. Kotenko, Oleg Karsaev
    Multi-agent technologies for computer network security: attack simulation, intrusion detection and intrusion detection learning. [Citation Graph (0, 0)][DBLP]
    Comput. Syst. Sci. Eng., 2003, v:18, n:4, pp:191-200 [Journal]
  21. Igor V. Kotenko, Alexander Ulanov
    Multi-agent Framework for Simulation of Adaptive Cooperative Defense Against Internet Attacks. [Citation Graph (0, 0)][DBLP]
    AIS-ADM, 2007, pp:212-228 [Conf]
  22. Igor V. Kotenko, Olga Chervatuk, Ekaterina Sidelnikova, Artem Tishkov
    Hybrid Multi-module Security Policy Verification. [Citation Graph (0, 0)][DBLP]
    POLICY, 2007, pp:277- [Conf]

  23. Security and Scalability of Remote Entrusting Protection. [Citation Graph (, )][DBLP]


  24. Genetic Optimization of Access Control Schemes in Virtual Local Area Networks. [Citation Graph (, )][DBLP]


  25. Packet Level Simulation of Cooperative Distributed Defense against Internet Attacks. [Citation Graph (, )][DBLP]


  26. Framework for Integrated Proactive Network Worm Detection and Response. [Citation Graph (, )][DBLP]


  27. Malware Detection by Data Mining Techniques Based on Positionally Dependent Features. [Citation Graph (, )][DBLP]


  28. Investigation of Cooperative Defense against DDoS. [Citation Graph (, )][DBLP]


  29. Agent-based modeling and simulation of network softbots' competition. [Citation Graph (, )][DBLP]


  30. Security Policy Verification Tool for Geographical Information Systems. [Citation Graph (, )][DBLP]


  31. Software Environment for Simulation and Evaluation of a Security Operation Center. [Citation Graph (, )][DBLP]


  32. Integrated Usage of Data Mining Methods for Malware Detection. [Citation Graph (, )][DBLP]


  33. Design of Entrusting Protocols for Software Protection. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.304secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002