default search action
Maxim Kolomeets
Person information
- affiliation: Newcastle University, Newcastle Upon Tyne, UK
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j10]Maxim Kolomeets, Olga Tushkanova, Vasily Desnitsky, Lidia Vitkova, Andrey Chechulin:
Experimental Evaluation: Can Humans Recognise Social Media Bots? Big Data Cogn. Comput. 8(3): 24 (2024) - [c15]Andrey Chechulin, Maxim Kolomeets:
From Detection to Dissection: Unraveling Bot Characteristics in the VKontakte Social Network. COMSNETS 2024: 159-164 - 2023
- [j9]Shola Olabode, Rebecca Owens, Viana Nijia Zhang, Jehana Copilah-Ali, Maxim Kolomeets, Han Wu, Shrikant Malviya, Karolina Markeviciute, Tasos Spiliotopoulos, Cristina Neesham, Lei Shi, Deborah Chambers:
Complex online harms and the smart home: A scoping review. Future Gener. Comput. Syst. 149: 664-678 (2023) - [j8]Maxim Kolomeets, Vasily Desnitsky, Igor V. Kotenko, Andrey Chechulin:
Graph Visualization: Alternative Models Inspired by Bioinformatics. Sensors 23(7): 3747 (2023) - [j7]Maxim Kolomeets, Andrey Chechulin:
Social bot metrics. Soc. Netw. Anal. Min. 13(1): 36 (2023) - 2022
- [c14]Maxim Kolomeets, Andrey Chechulin, Lidia Vitkova:
Technique for Investigating Attacks on a Company's Reputation on a Social Media Platform. IDC 2022: 234-243 - 2021
- [j6]Maxim Kolomeets, Andrey Chechulin, Igor V. Kotenko:
Bot detection by friends graph in social networks. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 12(2): 141-159 (2021) - [c13]Elena Doynikova, Evgenia Novikova, Ivan Murenin, Maxim Kolomeec, Diana Gaifulina, Olga Tushkanova, Dmitry Levshun, Alexey Meleshko, Igor V. Kotenko:
Security Measuring System for IoT Devices. CyberICPS/SECPRE/ADIoT/SPOSE/CPS4CIP/CDT&SECOMANE@ESORICS 2021: 256-275 - [c12]Maxim Kolomeets, Andrey Chechulin:
Analysis of the Malicious Bots Market. FRUCT 2021: 199-205 - [c11]Maxim Kolomeets, Olga Tushkanova, Dmitry Levshun, Andrey Chechulin:
Camouflaged bot detection using the friend list. PDP 2021: 253-259 - 2020
- [c10]Maxim Kolomeets, Andrey Chechulin, Ksenia Zhernova, Igor V. Kotenko, Diana Gaifulina:
Augmented reality for visualizing security data for cybernetic and cyberphysical systems. PDP 2020: 421-428
2010 – 2019
- 2019
- [j5]Maxim Kolomeets, Andrey Chechulin, Igor V. Kotenko:
Social networks analysis by graph algorithms on the example of the VKontakte social network. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 10(2): 55-75 (2019) - [j4]Maxim Kolomeets, Amira Benachour, Didier El Baz, Andrey Chechulin, Martin Strecker, Igor V. Kotenko:
Reference architecture for social networks graph analysis. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 10(4): 109-125 (2019) - [c9]Lidia Vitkova, Maxim Kolomeets:
Approach to Identification and Analysis of Information Sources in Social Networks. IDC 2019: 285-293 - [c8]Ksenia Zhernova, Maxim Kolomeets, Igor V. Kotenko, Andrey Chechulin:
Adaptive Touch Interface: Application for Mobile Internet Security. MobiSec 2019: 53-72 - [c7]Maxim Kolomeets, Andrey Chechulin, Igor V. Kotenko, Igor Saenko:
Access Control Visualization Using Triangular Matrices. PDP 2019: 348-355 - 2018
- [j3]Igor V. Kotenko, Maxim Kolomeets, Andrey Chechulin, Yannick Chevalier:
A visual analytics approach for the cyber forensics based on different views of the network traffic. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 9(2): 57-73 (2018) - [c6]Ivo Berger, Roland Rieke, Maxim Kolomeets, Andrey Chechulin, Igor V. Kotenko:
Comparative Study of Machine Learning Methods for In-Vehicle Intrusion Detection. CyberICPS/SECPRE@ESORICS 2018: 85-101 - [c5]Maxim Kolomeets, Andrey Chechulin, Igor V. Kotenko:
Visual analysis of CAN bus traffic injection using radial bar charts. ICPS 2018: 841-846 - 2017
- [c4]Maxim Kolomeec, Gustavo Gonzalez Granadillo, Elena Doynikova, Andrey Chechulin, Igor V. Kotenko, Hervé Debar:
Choosing Models for Security Metrics Visualization. MMM-ACNS 2017: 75-87 - [c3]Maxim Kolomeets, Andrey Chechulin, Igor V. Kotenko, Martin Strecker:
Voronoi Maps for Planar Sensor Networks Visualization. MobiSec 2017: 96-109 - 2016
- [j2]Maxim Kolomeec, Andrey Chechulin, Anton Pronoza, Igor V. Kotenko:
Technique of Data Visualization: Example of Network Topology Display for Security Monitoring. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 7(1): 58-78 (2016) - [c2]Maxim Kolomeets, Andrey Chechulin, Igor V. Kotenko:
Visualization Model for Monitoring of Computer Networks Security Based on the Analogue of Voronoi Diagrams. CD-ARES 2016: 141-157 - [c1]Vasily Desnitsky, Andrey Chechulin, Igor V. Kotenko, Dmitry Levshun, Maxim Kolomeec:
Application of a Technique for Secure Embedded Device Design Based on Combining Security Components for Creation of a Perimeter Protection System. PDP 2016: 609-616 - 2015
- [j1]Maxim Kolomeec, Andrey Chechulin, Igor V. Kotenko:
Methodological Primitives for Phased Construction of Data Visualization Models. J. Internet Serv. Inf. Secur. 5(4): 60-84 (2015)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint