default search action
Andrey Chechulin
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j27]Maxim Kolomeets, Olga Tushkanova, Vasily Desnitsky, Lidia Vitkova, Andrey Chechulin:
Experimental Evaluation: Can Humans Recognise Social Media Bots? Big Data Cogn. Comput. 8(3): 24 (2024) - [c47]Andrey Chechulin, Maxim Gorda:
Cybercrime Investigation Model. COMSNETS 2024: 37-42 - [c46]Andrey Chechulin, Maxim Kolomeets:
From Detection to Dissection: Unraveling Bot Characteristics in the VKontakte Social Network. COMSNETS 2024: 159-164 - 2023
- [j26]Dmitry Levshun, Olga Tushkanova, Andrey Chechulin:
Two-model active learning approach for inappropriate information classification in social networks. Int. J. Inf. Sec. 22(6): 1921-1936 (2023) - [j25]Dmitry Vesnin, Dmitry Levshun, Andrey Chechulin:
Trademark Similarity Evaluation Using a Combination of ViT and Local Features. Inf. 14(7): 398 (2023) - [j24]Maxim Kolomeets, Vasily Desnitsky, Igor V. Kotenko, Andrey Chechulin:
Graph Visualization: Alternative Models Inspired by Bioinformatics. Sensors 23(7): 3747 (2023) - [j23]Maxim Kolomeets, Andrey Chechulin:
Social bot metrics. Soc. Netw. Anal. Min. 13(1): 36 (2023) - [c45]Dmitry Levshun, Andrey Chechulin:
Vulnerability Categorization for Fast Multistep Attack Modelling. FRUCT 2023: 169-175 - [c44]Konstantin E. Izrailov, Nikita Romanov, Andrey Chechulin, Alexander Yaroshenko, Igor V. Kotenko:
Intelligent Selection of Requirements for a Secure Design of Smart City Transport Infrastructure Interfaces. IDC 2023: 135-148 - 2022
- [j22]Vasily Desnitsky, Andrey Chechulin, Igor V. Kotenko:
Multi-Aspect Based Approach to Attack Detection in IoT Clouds. Sensors 22(5): 1831 (2022) - [j21]Alexey M. Kashevnik, Andrew Ponomarev, Nikolay Shilov, Andrey Chechulin:
Threats Detection during Human-Computer Interaction in Driver Monitoring Systems. Sensors 22(6): 2380 (2022) - [j20]Dmitry Levshun, Andrey Chechulin, Igor V. Kotenko:
Security and Privacy Analysis of Smartphone-Based Driver Monitoring Systems from the Developer's Point of View. Sensors 22(13): 5063 (2022) - [c43]Maxim Kolomeets, Andrey Chechulin, Lidia Vitkova:
Technique for Investigating Attacks on a Company's Reputation on a Social Media Platform. IDC 2022: 234-243 - [c42]Dmitry Levshun, Olga Tushkanova, Andrey Chechulin:
Active learning approach for inappropriate information classification in social networks. PDP 2022: 283-289 - 2021
- [j19]Lidia Vitkova, Igor V. Kotenko, Andrey Chechulin:
An Approach to Ranking the Sources of Information Dissemination in Social Networks. Inf. 12(10): 416 (2021) - [j18]Maxim Kolomeets, Andrey Chechulin, Igor V. Kotenko:
Bot detection by friends graph in social networks. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 12(2): 141-159 (2021) - [j17]Dmitry Levshun, Igor V. Kotenko, Andrey Chechulin:
The application of the methodology for secure cyber-physical systems design to improve the semi-natural model of the railway infrastructure. Microprocess. Microsystems 87: 103482 (2021) - [j16]Dmitry Levshun, Andrey Chechulin, Igor V. Kotenko:
Design of Secure Microcontroller-Based Systems: Application to Mobile Robots for Perimeter Monitoring. Sensors 21(24): 8451 (2021) - [c41]Maxim Kolomeets, Andrey Chechulin:
Analysis of the Malicious Bots Market. FRUCT 2021: 199-205 - [c40]Ksenia Namyatova, Lidia Vitkova, Andrey Chechulin:
An Approach to Automated Assessment of the Image of a Territorial Entity in the Media Discourse of a Foreign States. IDC 2021: 215-224 - [c39]Dmitry Levshun, Andrey Chechulin, Igor V. Kotenko:
A Technique for the Design of Abstract Models of Microcontroller-Based Physical Security Systems. IDC 2021: 397-406 - [c38]Konstantin E. Izrailov, Dmitry Levshun, Igor V. Kotenko, Andrey Chechulin:
Classification and Analysis of Vulnerabilities in Mobile Device Infrastructure Interfaces. MobiSec 2021: 301-319 - [c37]Maxim Kolomeets, Olga Tushkanova, Dmitry Levshun, Andrey Chechulin:
Camouflaged bot detection using the friend list. PDP 2021: 253-259 - 2020
- [j15]Alexey M. Kashevnik, Andrew Ponomarev, Nikolay Shilov, Andrey Chechulin:
In-Vehicle Situation Monitoring for Potential Threats Detection Based on Smartphone Sensors. Sensors 20(18): 5049 (2020) - [j14]Dmitry Levshun, Yannick Chevalier, Igor V. Kotenko, Andrey Chechulin:
Design and verification of a mobile robot based on the integrated model of cyber-Physical systems. Simul. Model. Pract. Theory 105: 102151 (2020) - [c36]Daniel Zelle, Roland Rieke, Christian Plappert, Christoph Krauß, Dmitry Levshun, Andrey Chechulin:
SEPAD - Security Evaluation Platform for Autonomous Driving. PDP 2020: 413-420 - [c35]Maxim Kolomeets, Andrey Chechulin, Ksenia Zhernova, Igor V. Kotenko, Diana Gaifulina:
Augmented reality for visualizing security data for cybernetic and cyberphysical systems. PDP 2020: 421-428 - [c34]Maksim Kalameyets, Dmitry Levshun, Sergei Soloviev, Andrey Chechulin, Igor V. Kotenko:
Social networks bot detection using Benford's law. SIN 2020: 19:1-19:8
2010 – 2019
- 2019
- [j13]Alexander Branitskiy, Dmitry Levshun, Natalia Krasilnikova, Elena Doynikova, Igor V. Kotenko, Artem Tishkov, Nina Vanchakova, Andrey Chechulin:
Determination of Young Generation's Sensitivity to the Destructive Stimuli based on the Information in Social Networks. J. Internet Serv. Inf. Secur. 9(3): 1-20 (2019) - [j12]Maxim Kolomeets, Andrey Chechulin, Igor V. Kotenko:
Social networks analysis by graph algorithms on the example of the VKontakte social network. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 10(2): 55-75 (2019) - [j11]Maxim Kolomeets, Amira Benachour, Didier El Baz, Andrey Chechulin, Martin Strecker, Igor V. Kotenko:
Reference architecture for social networks graph analysis. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 10(4): 109-125 (2019) - [c33]Diana Gaifulina, Andrey Chechulin:
Development of the Complex Algorithm for Web Pages Classification to Detection Inappropriate Information on the Internet. IDC 2019: 278-284 - [c32]Dmitry Levshun, Igor V. Kotenko, Andrey Chechulin:
The Integrated Model of Secure Cyber-Physical Systems for Their Design and Verification. IDC 2019: 333-343 - [c31]Yannick Chevalier, Roland Rieke, Florian Fenzl, Andrey Chechulin, Igor V. Kotenko:
ECU-Secure: Characteristic Functions for In-Vehicle Intrusion Detection. IDC 2019: 495-504 - [c30]Ksenia Zhernova, Maxim Kolomeets, Igor V. Kotenko, Andrey Chechulin:
Adaptive Touch Interface: Application for Mobile Internet Security. MobiSec 2019: 53-72 - [c29]Dmitry Levshun, Yurii Bakhtin, Andrey Chechulin, Igor V. Kotenko:
Analysis of Attack Actions on the Railway Infrastructure Based on the Integrated Model. MobiSec 2019: 145-162 - [c28]Dmitry Levshun, Andrey Chechulin, Igor V. Kotenko, Yannick Chevalier:
Design and Verification Methodology for Secure and Distributed Cyber-Physical Systems. NTMS 2019: 1-5 - [c27]Maxim Kolomeets, Andrey Chechulin, Igor V. Kotenko, Igor Saenko:
Access Control Visualization Using Triangular Matrices. PDP 2019: 348-355 - [i1]Ilya Afanasyev, Alexander Kolotov, Ruslan Rezin, Konstantin Danilov, Manuel Mazzara, Subham Chakraborty, Alexey M. Kashevnik, Andrey Chechulin, Aleksandr A. Kapitonov, Vladimir Jotsov, Andon V. Topalov, Nikola Georgiev Shakev, Sevil Ahmed:
Towards Blockchain-based Multi-Agent Robotic Systems: Analysis, Classification and Applications. CoRR abs/1907.07433 (2019) - 2018
- [j10]Igor V. Kotenko, Andrey Fedorchenko, Elena Doynikova, Andrey Chechulin:
An Ontology-based Storage of Security Information. Inf. Technol. Control. 47(4): 655-667 (2018) - [j9]Igor V. Kotenko, Maxim Kolomeets, Andrey Chechulin, Yannick Chevalier:
A visual analytics approach for the cyber forensics based on different views of the network traffic. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 9(2): 57-73 (2018) - [c26]Ivo Berger, Roland Rieke, Maxim Kolomeets, Andrey Chechulin, Igor V. Kotenko:
Comparative Study of Machine Learning Methods for In-Vehicle Intrusion Detection. CyberICPS/SECPRE@ESORICS 2018: 85-101 - [c25]Dmitry Levshun, Andrey Chechulin, Igor V. Kotenko:
A technique for design of secure data transfer environment: Application for I2C protocol. ICPS 2018: 789-794 - [c24]Maxim Kolomeets, Andrey Chechulin, Igor V. Kotenko:
Visual analysis of CAN bus traffic injection using radial bar charts. ICPS 2018: 841-846 - [c23]Andrey Chechulin, Igor V. Kotenko:
Application of Image Classification Methods for Protection against Inappropriate Information in the Internet. IOTAIS 2018: 167-173 - [c22]Igor V. Kotenko, Igor Saenko, Andrey Chechulin, Vasily Desnitsky, Lidia Vitkova, Anton Pronoza:
Monitoring and Counteraction to Malicious Influences in the Information Space of Social Networks. SocInfo (2) 2018: 159-167 - [p1]Igor V. Kotenko, Elena Doynikova, Andrey Chechulin, Andrey Fedorchenko:
AI- and Metrics-Based Vulnerability-Centric Cyber Security Assessment and Countermeasure Selection. Guide to Vulnerability Analysis for Computer Networks and Systems 2018: 101-130 - 2017
- [j8]Igor V. Kotenko, Andrey Chechulin, Dmitry Komashinsky:
Categorisation of web pages for protection against inappropriate content in the internet. Int. J. Internet Protoc. Technol. 10(1): 61-71 (2017) - [c21]Elena Doynikova, Andrey Chechulin, Igor V. Kotenko:
Analytical attack modeling and security assessment based on the common vulnerability scoring system. FRUCT 2017: 53-61 - [c20]Dmitry Levshun, Andrey Chechulin, Igor V. Kotenko:
Design lifecycle for secure cyber-physical systems based on embedded devices. IDAACS 2017: 277-282 - [c19]Igor V. Kotenko, Andrey Chechulin, Elena Doynikova, Andrey Fedorchenko:
Ontological Hybrid Storage for Security Data. IDC 2017: 159-171 - [c18]Maxim Kolomeec, Gustavo Gonzalez Granadillo, Elena Doynikova, Andrey Chechulin, Igor V. Kotenko, Hervé Debar:
Choosing Models for Security Metrics Visualization. MMM-ACNS 2017: 75-87 - [c17]Maxim Kolomeets, Andrey Chechulin, Igor V. Kotenko, Martin Strecker:
Voronoi Maps for Planar Sensor Networks Visualization. MobiSec 2017: 96-109 - 2016
- [j7]Maxim Kolomeec, Andrey Chechulin, Anton Pronoza, Igor V. Kotenko:
Technique of Data Visualization: Example of Network Topology Display for Security Monitoring. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 7(1): 58-78 (2016) - [j6]Vasily Desnitsky, Dmitry Levshun, Andrey Chechulin, Igor V. Kotenko:
Design Technique for Secure Embedded Devices: Application for Creation of Integrated Cyber-Physical Security System. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 7(2): 60-80 (2016) - [c16]Maxim Kolomeets, Andrey Chechulin, Igor V. Kotenko:
Visualization Model for Monitoring of Computer Networks Security Based on the Analogue of Voronoi Diagrams. CD-ARES 2016: 141-157 - [c15]Vasily Desnitsky, Andrey Chechulin, Igor V. Kotenko, Dmitry Levshun, Maxim Kolomeec:
Application of a Technique for Secure Embedded Device Design Based on Combining Security Components for Creation of a Perimeter Protection System. PDP 2016: 609-616 - 2015
- [j5]Andrey Chechulin, Igor V. Kotenko:
Attack tree-based approach for real-time security event processing. Autom. Control. Comput. Sci. 49(8): 701-704 (2015) - [j4]Maxim Kolomeec, Andrey Chechulin, Igor V. Kotenko:
Methodological Primitives for Phased Construction of Data Visualization Models. J. Internet Serv. Inf. Secur. 5(4): 60-84 (2015) - [j3]Andrey Fedorchenko, Igor V. Kotenko, Andrey Chechulin:
Integrated Repository of Security Information for Network Security Evaluation. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 6(2): 41-57 (2015) - [c14]Igor V. Kotenko, Andrey Chechulin, Dmitry Komashinsky:
Evaluation of text classification techniques for inappropriate web content blocking. IDAACS 2015: 412-417 - [c13]Dmitry Novozhilov, Igor V. Kotenko, Andrey Chechulin:
Improving the Categorization of Web Sites by Analysis of Html-Tags Statistics to Block Inappropriate Content. IDC 2015: 257-263 - [c12]Andrey Fedorchenko, Igor V. Kotenko, Andrey Chechulin:
Design of Integrated Vulnerabilities Database for Computer Networks Security Analysis. PDP 2015: 559-566 - 2014
- [j2]Igor V. Kotenko, Andrey Chechulin:
Fast Network Attack Modeling and Security Evaluation based on Attack Graphs. J. Cyber Secur. Mobil. 3(1): 27-46 (2014) - [c11]Igor V. Kotenko, Andrey Chechulin, Andrey Shorov, Dmitry Komashinsky:
Analysis and Evaluation of Web Pages Classification Techniques for Inappropriate Content Blocking. ICDM 2014: 39-54 - [c10]Igor V. Kotenko, Elena Doynikova, Andrey Chechulin:
Security Metrics Based on Attack Graphs for the Olympic Games Scenario. PDP 2014: 561-568 - 2013
- [j1]Igor V. Kotenko, Olga Polubelova, Andrey Chechulin, Igor Saenko:
Design and Implementation of a Hybrid Ontological-Relational Data Repository for SIEM Systems. Future Internet 5(3): 355-375 (2013) - [c9]Igor V. Kotenko, Andrey Chechulin:
A Cyber Attack Modeling and Impact Assessment framework. CyCon 2013: 1-24 - [c8]Igor V. Kotenko, Andrey Chechulin:
Computer attack modeling and security evaluation based on attack graphs. IDAACS 2013: 614-619 - [c7]Igor V. Kotenko, Andrey Shorov, Andrey Chechulin, Evgenia Novikova:
Dynamical Attack Simulation for Security Information and Event Management. IF&GIS 2013: 219-234 - 2012
- [c6]Igor V. Kotenko, Andrey Chechulin:
Common Framework for Attack Modeling and Security Evaluation in SIEM Systems. GreenCom 2012: 94-101 - [c5]Andrey Chechulin, Igor V. Kotenko, Vasily Desnitsky:
An Approach for Network Information Flow Analysis for Systems of Embedded Components. MMM-ACNS 2012: 146-155 - [c4]Vasily Desnitsky, Igor V. Kotenko, Andrey Chechulin:
Configuration-Based Approach to Embedded Device Security. MMM-ACNS 2012: 270-285 - [c3]José Fran. Ruiz, Rajesh Harjani, Antonio Mana, Vasily Desnitsky, Igor V. Kotenko, Andrey Chechulin:
A Methodology for the Analysis and Modeling of Security Threats and Attacks for Systems of Embedded Components. PDP 2012: 261-268 - [c2]Igor V. Kotenko, Andrey Chechulin, Evgenia Novikova:
Attack Modelling and Security Evaluation for Security Information and Event Management. SECRYPT 2012: 391-394 - 2011
- [c1]Igor V. Kotenko, Andrey Chechulin, Elena Doynikova:
Combining of Scanning Protection Mechanisms in GIS and Corporate Information Systems. IF&GIS 2011: 45-58
Coauthor Index
aka: Maxim Kolomeec
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 20:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint