default search action
Andrey Shorov
Person information
- affiliation: Saint Petersburg Electrotechnical University, Russia
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j9]Ivan Kholod, Andrey Shorov, Sergei Gorlatch:
Efficient Distribution and Processing of Data for Parallelizing Data Mining in Mobile Clouds. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 11(1): 2-17 (2020)
2010 – 2019
- 2019
- [j8]Elena N. Stankova, Andrey V. Balakshiy, Dmitry A. Petrov, Vladimir V. Korkhov, Andrey V. Shorov:
OLAP technology and machine learning as the tools for validation of the numerical models of convective clouds. Int. J. Bus. Intell. Data Min. 14(1/2): 254-266 (2019) - [j7]Ivan Kholod, Andrey Shorov, Evgenii Titkov, Sergei Gorlatch:
A formally based parallelization of data mining algorithms for multi-core systems. J. Supercomput. 75(12): 7909-7920 (2019) - [c25]Ivan Kholod, Andrey Shorov, Sergei Gorlatch:
Improving Parallel Data Mining for Different Data Distributions in IoT Systems. IDC 2019: 75-85 - [c24]Yana A. Bekeneva, Vladimir Mochalov, Andrey Shorov:
Approach to Association and Classification Rules Visualization. IDC 2019: 541-546 - [c23]Evgenia Novikova, Mikhail Bestuzhev, Andrey Shorov:
The Visualization-Driven Approach to the Analysis of the HVAC Data. IDC 2019: 547-552 - [c22]Aleksey Malov, Sergey Rodionov, Andrey Shorov:
Data Mining Algorithms Parallelization in Logic Programming Framework for Execution in Cluster. NEW2AN 2019: 91-103 - [c21]Evgenia Novikova, Yana A. Bekeneva, Andrey Shorov:
An Approach to the Analysis of the Vehicle Movement on the Organization Territory. NEW2AN 2019: 157-167 - [c20]Ivan Kholod, Andrey Shorov, Maria Efimova, Sergei Gorlatch:
Parallelization of Algorithms for Mining Data from Distributed Sources. PaCT 2019: 289-303 - [c19]Evgenia Novikova, Yana A. Bekeneva, Andrey Shorov:
The Location-Centric Approach to Employee's Interaction Pattern Detection. PDP 2019: 373-378 - 2018
- [j6]Evgenia Novikova, Yana A. Bekeneva, Andrey Shorov:
The Motif-Based Approach to the Analysis of the Employee Trajectories within Organization. Secur. Commun. Networks 2018: 2476968:1-2476968:12 (2018) - 2017
- [j5]Ivan Kholod, Nikolay Plokhoy, Andrey Shorov:
Distributed Measurement Data Gathering about Moving Objects. Wirel. Commun. Mob. Comput. 2017 (2017) - [c18]Ivan Kholod, Maria Efimova, Andrey Rukavitsyn, Andrey Shorov:
Time Series Distributed Analysis in IoT with ETL and Data Mining Technologies. NEW2AN 2017: 97-108 - [c17]Ivan Kholod, Nikolai Plokhoi, Andrey Shorov:
Fog Computing for Telemetry Gathering from Moving Objects. NEW2AN 2017: 498-509 - [c16]Ivan Kholod, Andrey Shorov, Sergei Gorlatch:
A Functional Approach to Parallelizing Data Mining Algorithms in Java. PaCT 2017: 459-472 - 2016
- [j4]Ivan Kholod, Ilya Petukhov, Andrey Shorov:
Cloud for Distributed Data Analysis Based on the Actor Model. Sci. Program. 2016: 1050293:1-1050293:11 (2016) - [c15]Elena N. Stankova, Andrey V. Balakshiy, Dmitry A. Petrov, Andrey V. Shorov, Vladimir V. Korkhov:
Using Technologies of OLAP and Machine Learning for Validation of the Numerical Models of Convective Clouds. ICCSA (3) 2016: 463-472 - [c14]Konstantin Borisenko, Andrey Smirnov, Evgenia Novikova, Andrey Shorov:
DDoS Attacks Detection in Cloud Computing Using Data Mining Techniques. ICDM 2016: 197-211 - [c13]Konstantin Borisenko, Andrey Rukavitsyn, Andrei V. Gurtov, Andrey Shorov:
Detecting the Origin of DDoS Attacks in OpenStack Cloud Platform Using Data Mining Techniques. NEW2AN 2016: 303-315 - [c12]Yana A. Bekeneva, Nikolay Shipilov, Andrey Shorov:
Investigation of Protection Mechanisms Against DRDoS Attacks Using a Simulation Approach. NEW2AN 2016: 316-325 - 2015
- [c11]Yana A. Bekeneva, Konstantin Borisenko, Andrey Shorov, Igor V. Kotenko:
Investigation of DDoS Attacks by Hybrid Simulation. ICT-EurAsia/CONFENIS 2015: 179-189 - [c10]Ivan Kholod, Mikhail Kuprianov, Andrey Shorov:
Constructing Parallel Association Algorithms from Function Blocks. ICDM 2015: 124-138 - [c9]Ivan Kholod, Mikhail Kuprianov, Andrey Shorov:
Parallelization of data mining algorithms for multicore processors. MECO 2015: 262-267 - [c8]Konstantin Borisenko, Ivan Kholod, Andrey Shorov:
Modeling Framework for Developing and Testing Network Security Techniques against DDoS Attacks. SEKE 2015: 715 - 2014
- [j3]Konstantin Borisenko, Ivan Kholod, Andrey Shorov:
Framework for Infrastructure Attack Modeling in Hybrid Networks. Int. J. Mob. Comput. Multim. Commun. 6(4): 98-114 (2014) - [c7]Ivan Kholod, Zaynidin Karshiyev, Andrey Shorov:
The Formal Model of Data Mining Algorithms for Parallelize Algorithms. ACS 2014: 385-394 - [c6]Igor V. Kotenko, Andrey Shorov:
Simulation of Bio-inspired Security Mechanisms against Network Infrastructure Attacks. IDC 2014: 127-133 - [c5]Igor V. Kotenko, Andrey Chechulin, Andrey Shorov, Dmitry Komashinsky:
Analysis and Evaluation of Web Pages Classification Techniques for Inappropriate Content Blocking. ICDM 2014: 39-54 - 2013
- [j2]Igor V. Kotenko, Filipp G. Nesteruk, Andrey V. Shorov:
Conception of a Hybrid Ad Aptive Protectionof Information Systems. Int. J. Comput. 12(1): 86-98 (2013) - [c4]Igor V. Kotenko, Andrey Shorov, Andrey Chechulin, Evgenia Novikova:
Dynamical Attack Simulation for Security Information and Event Management. IF&GIS 2013: 219-234 - [c3]Igor V. Kotenko, Andrey Shorov, Evgenia Novikova:
Simulation of Protection Mechanisms Based on "Nervous Network System" against Infrastructure Attacks. PDP 2013: 526-533 - 2012
- [j1]Igor V. Kotenko, Alexey Konovalov, Andrey Shorov:
Agent-based simulation of cooperative defence against botnets. Concurr. Comput. Pract. Exp. 24(6): 573-588 (2012) - [c2]Igor V. Kotenko, Andrey Shorov:
Simulation of Protection Mechanisms against Botnets on the Basis of "Nervous Network" Framework. SIMULTECH 2012: 164-169 - 2010
- [c1]Igor V. Kotenko, Alexey Konovalov, Andrey Shorov:
Simulation of Botnets: Agent-Based Approach. IDC 2010: 247-252
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-16 20:53 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint