default search action
Oleg B. Makarevich
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2019
- [c32]Elena Basan, Alexander S. Basan, Oleg B. Makarevich:
Detection of Anomalies in the Robotic System Based on the Calculation of Kullback-Leibler Divergence. CyberC 2019: 337-340 - [c31]Elena Basan, Oleg B. Makarevich, Evgeny Abramov, Dmitry Popov:
Analysis of the initial security of the robotics system. SIN 2019: 11:1-11:8 - [c30]Vitaly V. Lapshichyov, Oleg B. Makarevich:
TLS certificate as a sign of establishing a connection with the network Tor. SIN 2019: 14:1-14:6 - [e8]Oleg B. Makarevich, Dmitry Popov, Ludmila K. Babenko, Pete Burnap, Atilla Elçi, Ron Poet, Jaideep Vaidya, Mehmet A. Orgun, Manoj Singh Gaur, Rajveer Singh Shekhawat:
Proceedings of the 12th International Conference on Security of Information and Networks, SIN 2019, Sochi, Russian Federation, September 12-15, 2019. ACM 2019, ISBN 978-1-4503-7242-8 [contents] - 2018
- [c29]Elena Basan, Alexander S. Basan, Oleg B. Makarevich:
Evaluating and Detecting Internal Attacks in a Mobile Robotic Network. CyberC 2018 - [c28]Maxim Pismensky, Elena Basan, Oleg B. Makarevich:
Development of a Protection System for a Group of Mobile Robots, Taking into Account the Requirements of Foreign and Russian Legislation. SIN 2018: 4:1-4:8 - [c27]Elena Basan, Oleg B. Makarevich, Alexandr S. Basan:
Development of the Anomaly Detection Method for a Group of Mobile Robots. SIN 2018: 20:1-20:4 - [c26]Elena Basan, Oleg B. Makarevich, Andrew Stepenkin:
Development of the Methodology for Testing the Security of Group Management System for Mobile Robots. SIN 2018: 27:1-27:2 - 2017
- [c25]Alexander S. Basan, Elena Basan, Oleg B. Makarevich:
A Trust Evaluation Method for Active Attack Counteraction in Wireless Sensor Networks. CyberC 2017: 369-372 - [c24]Liudmila Babenko, Ilya Pisarev, Oleg B. Makarevich:
A model of a secure electronic voting system based on blind intermediaries using russian cryptographic algorithms. SIN 2017: 45-50 - [c23]Alexander S. Basan, Elena Basan, Oleg B. Makarevich:
Analysis of ways to secure group control for autonomous mobile robots. SIN 2017: 134-139 - [e7]Rajveer Singh Shekhawat, Manoj Singh Gaur, Atilla Elçi, Jaideep Vaidya, Oleg B. Makarevich, Ron Poet, Mehmet A. Orgun, Vijaypal S. Dhaka, Manoj Kumar Bohra, Virender Singh, Ludmila K. Babenko, Naghmeh Moradpoor Sheykhkanloo, Behnam Rahnama:
Proceedings of the 10th International Conference on Security of Information and Networks, SIN 2017, Jaipur, IN, India, October 13-15, 2017. ACM 2017 [contents] - 2016
- [c22]Alexander S. Basan, Elena Basan, Oleg B. Makarevich:
Methodology of Countering Attacks for Wireless Sensor Networks Based on Trust. CyberC 2016: 409-412 - [c21]Alexandr S. Basan, Elena Basan, Oleg B. Makarevich:
Development of the Hierarchal Trust management System for Mobile Cluster-based Wireless Sensor Network. SIN 2016: 116-122 - 2015
- [c20]Elena Basan, Oleg B. Makarevich:
An Energy-Efficient System of Counteraction Against Attacks in the Mobile Wireless Sensor Networks. CyberC 2015: 403-410 - [c19]Philipp Burtyka, Oleg B. Makarevich:
Execution of data-dependent programs over encrypted data. SIN 2015: 84-89 - [c18]Ludmila K. Babenko, Philipp Burtyka, Oleg B. Makarevich, Alina Trepacheva:
The general model of secure computation system. SIN 2015: 177-184 - [c17]Evgeny Sergeevich Abramov, Elena Basan, Oleg B. Makarevich:
Trust management system for mobile cluster-based wireless sensor network. SIN 2015: 203-209 - [e6]Oleg B. Makarevich, Ron Poet, Atilla Elçi, Manoj Singh Gaur, Mehmet A. Orgun, Ludmila K. Babenko, Md. Sadek Ferdous, Anthony T. S. Ho, Vijay Laxmi, Josef Pieprzyk:
Proceedings of the 8th International Conference on Security of Information and Networks, SIN 2015, Sochi, Russian Federation, September 8-10, 2015. ACM 2015, ISBN 978-1-4503-3453-2 [contents] - 2014
- [c16]Artem Garkusha, Evgeny Sergeevich Abramov, Oleg B. Makarevich:
An effectiveness of application of <<Capture The Flag>> competitions concept within higher education (Student contribution). SIN 2014: 43 - [c15]Philipp Burtyka, Oleg B. Makarevich:
Symmetric Fully Homomorphic Encryption Using Decidable Matrix Equations. SIN 2014: 186 - [c14]Ludmila K. Babenko, Oleg B. Makarevich, Dmitry Bespalov, Roman Chesnokov, Yaroslav Trubnikov:
Instrumental System for Analysis of Information Systems Using Smart Cards Protection. SIN 2014: 339 - 2013
- [c13]Dmitry Rublev, Vladimir Fedorov, Oleg B. Makarevich:
Digital camera identification system. SIN 2013: 297-300 - [c12]Evgeny Sergeevich Abramov, Elena Basan, Oleg B. Makarevich:
Development of a secure cluster-based wireless sensor network model. SIN 2013: 372-375 - [c11]Ludmila K. Babenko, Alexandr S. Basan, Oleg B. Makarevich:
Performance analysis of the developed mandatory access control system in the DBMS. SIN 2013: 396-399 - [c10]Evgeny Sergeevich Abramov, Maxim Kobilev, Oleg B. Makarevich:
Using quadrocopter as a pentest tool. SIN 2013: 404-407 - [c9]Oleg B. Makarevich, Irina V. Mashkina, Alina Sentsova:
The method of the information security risk assessment in cloud computing systems. SIN 2013: 446-447 - [e5]Atilla Elçi, Manoj Singh Gaur, Mehmet A. Orgun, Oleg B. Makarevich:
The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013. ACM 2013, ISBN 978-1-4503-2498-4 [contents] - 2012
- [c8]Evgeny Sergeevich Abramov, Elena Barannik, Oleg B. Makarevich:
Methods of automated analysis of vendor specific implementation of stateful-filtration. SIN 2012: 158-162 - [e4]Manoj Singh Gaur, Atilla Elçi, Oleg B. Makarevich, Mehmet A. Orgun, Virendra Singh:
5th International Conference of Security of Information and Networks, SIN '12, Jaipur, India, October 22 - 26, 2012. ACM 2012, ISBN 978-1-4503-1668-2 [contents] - 2011
- [c7]Evgeny Sergeevich Abramov, Artem Viktorovich Andreev, Denis Valerievich Mordvin, Oleg B. Makarevich:
Corporate networks security evaluation based on attack graphs. SIN 2011: 29-36 - [e3]Mehmet A. Orgun, Atilla Elçi, Oleg B. Makarevich, Sorin A. Huss, Josef Pieprzyk, Lyudmila K. Babenko, Alexander G. Chefranov, Rajan Shankaran:
Proceedings of the 4th International Conference on Security of Information and Networks, SIN 2011, Sydney, NSW, Australia, November 14-19, 2011. ACM 2011, ISBN 978-1-4503-1020-8 [contents] - 2010
- [c6]Dmitry Rublev, Vladimir Fedorov, Oleg B. Makarevich:
Digital camera identification based on rotated images. SIN 2010: 90-93 - [c5]Evgeny Sergeevich Abramov, Denis Valerievich Mordvin, Oleg B. Makarevich:
Automated method for constructing of network traffic filtering rules. SIN 2010: 203-211 - [e2]Oleg B. Makarevich, Atilla Elçi, Mehmet A. Orgun, Sorin A. Huss, Ludmila K. Babenko, Alexander G. Chefranov, Vijay Varadharajan:
Proceedings of the 3rd International Conference on Security of Information and Networks, SIN 2010, Rostov-on-Don, Russian Federation, September 7-11, 2010. ACM 2010, ISBN 978-1-4503-0234-0 [contents]
2000 – 2009
- 2009
- [c4]Alexandr S. Basan, Lyudmila K. Babenko, Oleg B. Makarevich:
A model of mandatory access for current database management systems. SIN 2009: 67-70 - [c3]Dmitry Rublev, Vladimir Fedorov, Oleg B. Makarevich, Anatolij Chumachenko:
Digital sound card identification based on recording path imperfections. SIN 2009: 240-243 - [c2]Oleg B. Makarevich, Lyudmila K. Babenko:
Research and Education Activities of the Department of Security of Information Technologies of Taganrog Institute of Technology of the Southern Federal University in the Field of Information Security. SIN 2009: 302-303 - [e1]Atilla Elçi, Oleg B. Makarevich, Mehmet A. Orgun, Alexander G. Chefranov, Josef Pieprzyk, Yuri Anatolievich Bryukhomitsky, Siddika Berna Örs:
Proceedings of the 2nd International Conference on Security of Information and Networks, SIN 2009, Gazimagusa, North Cyprus, October 6-10, 2009. ACM 2009, ISBN 978-1-60558-412-6 [contents] - 2001
- [c1]Lyudmila K. Babenko, Alexander G. Chefranov, P. A. Fedorov, A. Yu. Korobko, Oleg B. Makarevich:
Mechanisms of Parallel Computing Organization for NeuroCluster. PaCT 2001: 181-185
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:48 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint