default search action
Igor Saenko 0001
Person information
- affiliation: St. Petersburg Federal Research Center of the Russian Academy of Sciences (SPC RAS), Russia
- affiliation: St. Petersburg Institute for Informatics and Automation of the Russian Academy of Sciences (SPIIRAS), Russia
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j17]Evgenia Novikova, Elena Fedorchenko, Alexandr Danilov, Igor Saenko:
Dataset Generation Methodology: Towards Application of Machine Learning in Industrial Water Treatment Security. SN Comput. Sci. 5(4): 373 (2024) - 2023
- [j16]Igor V. Kotenko, Igor Saenko, Andrei Privalov, Oleg Lauta:
Ensuring SDN Resilience under the Influence of Cyber Attacks: Combining Methods of Topological Transformation of Stochastic Networks, Markov Processes, and Neural Networks. Big Data Cogn. Comput. 7(2): 66 (2023) - [j15]Igor V. Kotenko, Igor Saenko, Alexey Vinogradenko, Nikita Budko:
Intelligent state assessment of complex autonomous objects based on wavelet analysis. Eng. Appl. Artif. Intell. 126: 106869 (2023) - [c46]Evgenia Novikova, Marat Bukhtiarov, Igor V. Kotenko, Elena Fedorchenko, Igor Saenko:
Towards Application of the Tabular Data Transformation to Images in the Intrusion Detection Tasks Using Deep Learning Techniques. IDC 2023: 85-100 - 2022
- [j14]Igor V. Kotenko, Igor Saenko, Igor B. Parashchuk, Elena Doynikova:
An approach for selecting countermeasures against harmful information based on uncertainty management. Comput. Sci. Inf. Syst. 19(1): 415-433 (2022) - [j13]Igor V. Kotenko, Igor Saenko, Oleg Lauta, Aleksander Kribel:
Ensuring the survivability of embedded computer networks based on early detection of cyber attacks by integrating fractal analysis and statistical methods. Microprocess. Microsystems 90: 104459 (2022) - [j12]Igor V. Kotenko, Igor Saenko, Oleg Lauta, Alexander Kribel:
A Proactive Protection of Smart Power Grids against Cyberattacks on Service Data Transfer Protocols by Computational Intelligence Methods. Sensors 22(19): 7506 (2022) - [c45]Igor V. Kotenko, Igor Saenko:
Applying Machine Learning Methods to Detect Abnormal User Behavior in a University Data Center. IDC 2022: 13-22 - [c44]Igor Saenko, Igor V. Kotenko:
Towards Resilient and Efficient Big Data Storage: Evaluating a SIEM Repository Based on HDFS. PDP 2022: 290-297 - 2021
- [j11]Alexander Branitskiy, Igor V. Kotenko, Igor Saenko:
Applying machine learning and parallel data processing for attack detection in IoT. IEEE Trans. Emerg. Top. Comput. 9(4): 1642-1653 (2021) - [c43]Igor V. Kotenko, Vladimir Avramenko, Albert Malikov, Igor Saenko:
An Approach to the Synthesis of a Neural Network System for Diagnosing Computer Incidents. IDC 2021: 407-416 - [c42]Igor V. Kotenko, Igor Saenko, Aleksander Kribel, Oleg Lauta:
A technique for early detection of cyberattacks using the traffic self-similarity property and a statistical approach. PDP 2021: 281-284 - [c41]Igor Saenko, Igor V. Kotenko, Fadey Skorik, Mazen Al-Barri:
Detecting Anomalous Behavior of Users of Data Centers Based on the Application of Artificial Neural Networks. RCAI 2021: 331-342 - [c40]Igor V. Kotenko, Igor Saenko, Oleg Lauta, Mikhail Karpov:
Situational Control of a Computer Network Security System in Conditions of Cyber Attacks. SIN 2021: 1-8 - [c39]Igor V. Kotenko, Oleg Lauta, Kseniya Kribel, Igor Saenko:
LSTM Neural Networks for Detecting Anomalies Caused by Web Application Cyber Attacks. SoMeT 2021: 127-140 - 2020
- [j10]Igor V. Kotenko, Lidiya Vitkova, Igor Saenko, Olga Tushkanova, Alexander Branitskiy:
The intelligent system for detection and counteraction of malicious and inappropriate information on the Internet. AI Commun. 33(1): 13-25 (2020) - [j9]Vyacheslav Efimov, Igor V. Kotenko, Igor Saenko:
Network Application-Layer Protocol Classification based on fuzzy Data and Neural Network Processing. Int. J. Comput. 19: 335-346 (2020) - [c38]Igor B. Parashchuk, Elena Doynikova, Igor Saenko, Igor V. Kotenko:
Selection of Countermeasures against Harmful Information based on the Assessment of Semantic Content of Information Objects in the Conditions of Uncertainty. INISTA 2020: 1-7 - [c37]Andrei Privalov, Ekaterina Skudneva, Igor V. Kotenko, Igor Saenko:
Graph-based evaluation of probability of disclosing the network structure by targeted attacks. NOMS 2020: 1-6 - [c36]Igor V. Kotenko, Yury Sineshchuk, Igor Saenko:
Optimizing Secure Information Interaction in Distributed Computing Systems by the Sequential Concessions Method. PDP 2020: 429-432 - [c35]Igor V. Kotenko, Igor Saenko, Fadey Skorik:
Intelligent support for network administrator decisions based on combined neural networks. SIN 2020: 31:1-31:8 - [p1]Igor V. Kotenko, Igor Saenko, Alexander Branitskiy:
Machine Learning and Big Data Processing for Cybersecurity Data Analysis. Data Science in Cybersecurity and Cyberthreat Intelligence 2020: 61-85
2010 – 2019
- 2019
- [j8]Igor V. Kotenko, Igor Saenko, Sergey Ageev:
Hierarchical fuzzy situational networks for online decision-making: Application to telecommunication systems. Knowl. Based Syst. 185 (2019) - [c34]Igor Saenko, Igor V. Kotenko:
A role-base approach and a genetic algorithm for VLAN design in large critical infrastructures. GECCO (Companion) 2019: 1643-1650 - [c33]Alexander Branitskiy, Andrey Fedorchenko, Igor V. Kotenko, Igor Saenko:
An Approach to Intelligent Distributed Scanning and Analytical Processing of the Internet Inappropriate Information. IDAACS 2019: 146-151 - [c32]Lidiya Vitkova, Igor Saenko, Olga Tushkanova:
An Approach to Creating an Intelligent System for Detecting and Countering Inappropriate Information on the Internet. IDC 2019: 244-254 - [c31]Igor V. Kotenko, Igor Saenko, Alexey Kushnerevich, Alexander Branitskiy:
Attack Detection in IoT Critical Infrastructures: A Machine Learning and Big Data Processing Approach. PDP 2019: 340-347 - [c30]Maxim Kolomeets, Andrey Chechulin, Igor V. Kotenko, Igor Saenko:
Access Control Visualization Using Triangular Matrices. PDP 2019: 348-355 - [c29]Igor V. Kotenko, Igor Saenko, Yury Sineshchuk, Valery Kuvatov, Oleg Chudakov:
Optimization of the cyber security system structure based on accounting of the prevented damage cost. SIN 2019: 7:1-7:8 - [c28]Igor V. Kotenko, Pavel Budko, Alexey Vinogradenko, Igor Saenko:
An Approach for Intelligent Evaluation of the State of Complex Autonomous Objects Based on the Wavelet Analysis. SoMeT 2019: 25-38 - 2018
- [j7]Igor V. Kotenko, Igor Saenko, Alexander Branitskiy:
Framework for Mobile Internet of Things Security Monitoring Based on Big Data Processing and Machine Learning. IEEE Access 6: 72714-72723 (2018) - [j6]Igor V. Kotenko, Igor Saenko, Alexander Branitskiy:
Applying Big Data Processing and Machine Learning Methods for Mobile Internet of Things Security Monitoring. J. Internet Serv. Inf. Secur. 8(3): 54-63 (2018) - [j5]Igor Saenko, Igor V. Kotenko:
Genetic Algorithms for Solving Problems of Access Control Design and Reconfiguration in Computer Networks. ACM Trans. Internet Techn. 18(3): 27:1-27:21 (2018) - [c27]Igor Saenko, Igor V. Kotenko:
Genetic algorithms for role mining in critical infrastructure data spaces. GECCO (Companion) 2018: 1688-1695 - [c26]Igor V. Kotenko, Igor Saenko:
Evolutionary Algorithms for Design of Virtual Private Networks. IDC 2018: 287-297 - [c25]Igor V. Kotenko, Igor Saenko, Sergey Ageev:
Applying Intelligent Agents for Anomaly Detection of Network Traffic in Internet of Things Networks. IOTAIS 2018: 123-129 - [c24]Igor V. Kotenko, Andrey Fedorchenko, Igor Saenko, Alexey Kushnerevich:
Parallelization of Security Event Correlation Based on Accounting of Event Type Links. PDP 2018: 462-469 - [c23]Igor V. Kotenko, Igor Saenko, Oleg Lauta:
Analytical modeling and assessment of cyber resilience on the base of stochastic networks conversion. RNDM 2018: 1-8 - [c22]Igor V. Kotenko, Sergey Ageev, Igor Saenko:
Implementation of Intelligent Agents for Network Traffic and Security Risk Analysis in Cyber-Physical Systems. SIN 2018: 22:1-22:4 - [c21]Igor V. Kotenko, Igor Saenko, Andrey Chechulin, Vasily Desnitsky, Lidia Vitkova, Anton Pronoza:
Monitoring and Counteraction to Malicious Influences in the Information Space of Social Networks. SocInfo (2) 2018: 159-167 - [c20]Igor V. Kotenko, Igor Saenko, Sergey Ageev:
Hierarchical Fuzzy Situational Networks for Online Decision Support in Distributed Cyber-Physical Systems. SoMeT 2018: 623-636 - 2017
- [j4]Igor V. Kotenko, Igor Saenko, Alexey Kushnerevich:
Parallel big data processing system for security monitoring in Internet of Things networks. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 8(4): 60-74 (2017) - [c19]Igor Saenko, Igor V. Kotenko:
Administrating role-based access control by genetic algorithms. GECCO (Companion) 2017: 1463-1470 - [c18]Igor Saenko, Igor V. Kotenko, Alexey Kushnerevich:
Parallel Processing of Big Heterogeneous Data for Security Monitoring of IoT Networks. PDP 2017: 329-336 - 2016
- [c17]Igor Saenko, Igor V. Kotenko:
Using Genetic Algorithms for Design and Reconfiguration of RBAC Schemes. PrAISe@ECAI 2016: 4:1-4:9 - [c16]Igor Saenko, Sergey Ageev, Igor V. Kotenko:
Detection of traffic anomalies in multi-service networks based on a fuzzy logical inference. IDC 2016: 79-88 - [c15]Igor Saenko, Igor V. Kotenko:
Reconfiguration of RBAC schemes by genetic algorithms. IDC 2016: 89-98 - [c14]Igor Saenko, Fadey Skorik, Igor V. Kotenko:
Application of Hybrid Neural Networks for Monitoring and Forecasting Computer Networks States. ISNN 2016: 521-530 - [c13]Igor V. Kotenko, Igor Saenko, Oleg Lauta, Mikhail Kocinyak:
Assessment of Computer Network Resilience Under Impact of Cyber Attacks on the Basis of Stochastic Networks Conversion. MobiSec 2016: 107-117 - [c12]Igor V. Kotenko, Igor Saenko:
An Approach to Aggregation of Security Events in Internet-of-Things Networks Based on Genetic Optimization. UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld 2016: 657-664 - 2015
- [j3]Igor V. Kotenko, Igor Saenko:
Improved genetic algorithms for solving the optimisation tasks for design of access control schemes in computer networks. Int. J. Bio Inspired Comput. 7(2): 98-110 (2015) - [c11]Igor V. Kotenko, Igor Saenko:
The Genetic Approach for Design of Virtual Private Networks. CSE 2015: 168-175 - [c10]Igor Saenko, Igor V. Kotenko:
Reconfiguration of Access Schemes in Virtual Networks of the Internet of Things by Genetic Algorithms. IDC 2015: 155-165 - [c9]Igor V. Kotenko, Igor Saenko, Sergey Ageev:
Countermeasure Security Risks Management in the Internet of Things Based on Fuzzy Logic Inference. TrustCom/BigDataSE/ISPA (1) 2015: 654-659 - 2014
- [j2]Igor Saenko, Igor V. Kotenko:
Design of Virtual Local Area Network Scheme Based on Genetic Optimization and Visual Analysis. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 5(4): 86-102 (2014) - [c8]Igor Saenko, Igor V. Kotenko:
A Genetic Approach for Virtual Computer Network Design. IDC 2014: 95-105 - 2013
- [j1]Igor V. Kotenko, Olga Polubelova, Andrey Chechulin, Igor Saenko:
Design and Implementation of a Hybrid Ontological-Relational Data Repository for SIEM Systems. Future Internet 5(3): 355-375 (2013) - [c7]Igor V. Kotenko, Olga Polubelova, Igor Saenko, Elena Doynikova:
The Ontology of Metrics for Security Evaluation and Decision Support in SIEM Systems. ARES 2013: 638-645 - [c6]Igor V. Kotenko, Olga Polubelova, Igor Saenko:
Logical Inference Framework for Security Management in Geographical Information Systems. IF&GIS 2013: 203-218 - 2012
- [c5]Igor V. Kotenko, Olga Polubelova, Igor Saenko:
The Ontological Approach for SIEM Data Repository Implementation. GreenCom 2012: 761-766 - [c4]Igor Saenko, Igor V. Kotenko:
Design and Performance Evaluation of Improved Genetic Algorithm for Role Mining Problem. PDP 2012: 269-274 - [c3]Igor V. Kotenko, Olga Polubelova, Igor Saenko:
Data Repository for Security Information and Event Management in Service Infrastructures. SECRYPT 2012: 308-313 - 2011
- [c2]Igor Saenko, Igor V. Kotenko:
Genetic Algorithms for Role Mining Problem. PDP 2011: 646-650 - 2010
- [c1]Igor Saenko, Igor V. Kotenko:
Genetic Optimization of Access Control Schemes in Virtual Local Area Networks. MMM-ACNS 2010: 209-216
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint