|
|
Publications in Math-Net.Ru |
Citations |
|
2013 |
1. |
D. V. Komashinskiy, “An approach to detect malicious documents based on Data Mining techniques”, Tr. SPIIRAN, 26 (2013), 126–135 |
2. |
D. V. Komashinskiy, “Detecting and identifying malicious executable binaries with Data Mining methods”, Tr. SPIIRAN, 26 (2013), 115–125 |
|
2012 |
3. |
D. V. Komashinskiy, I. V. Kotenko, “Investigation of structural specificities of malicious documents by Data Mining”, Informatsionnye Tekhnologii i Vychslitel'nye Sistemy, 2012, no. 2, 76–92 |
|
2009 |
4. |
D. V. Komashinskiy, I. V. Kotenko, A. V. Shorov, “Approach to detect malware based on postionally dependent information”, Tr. SPIIRAN, 10 (2009), 132–147 |
|
Organisations |
|
|