|
|
Publications in Math-Net.Ru |
Citations |
|
2021 |
1. |
S. I. Saitov, V. Yu. Budkov, D. K. Levonevsky, A. V. Denisov, “Conceptual model of a data transmission network for a polymodal control system in critical state infrastructure”, Vestnik S.-Petersburg Univ. Ser. 10. Prikl. Mat. Inform. Prots. Upr., 17:1 (2021), 59–71 |
2
|
|
2017 |
2. |
D. K. Levonevskiy, “Gamified learning as a cloud service”, Program Systems: Theory and Applications, 8:1 (2017), 209–217 |
3. |
V. Yu. Osipov, V. I. Vorobiev, D. K. Levonevskiy, “Problems of protection against false information in computer networks”, Tr. SPIIRAN, 53 (2017), 97–117 |
1
|
|
2016 |
4. |
V. I. Vorobiev, E. L. Evnevich, D. K. Levonevskiy, R. R. Fatkieva, L. N. Fedorchenko, “A Study and Selection of Cryptographic Standards on the basis of Text Mining”, Tr. SPIIRAN, 48 (2016), 69–87 |
1
|
|
2015 |
5. |
R. R. Fatkieva, D. K. Levonevskiy, “Application of Binary Trees for the IDS Events Aggregation Task”, Tr. SPIIRAN, 40 (2015), 110–121 |
1
|
|
2014 |
6. |
D. K. Levonevskiy, R. R. Fatkieva, “Research of combined “Denial of Service” attacks”, Tr. SPIIRAN, 32 (2014), 199–209 |
|
2013 |
7. |
D. K. Levonevskiy, Y.A. Pichugin, R. R. Fatkieva, “Estimation of traffic spectrum characteristics in the problem of various computer attacks detection”, Tr. SPIIRAN, 30 (2013), 56–64 |
1
|
8. |
D. K. Levonevskiy, Yu. A. Pichugin, R. R. Fatkieva, “Research of computer attacks by means of the observed traffic singular spectrum analysis”, Tr. SPIIRAN, 26 (2013), 101–114 |
2
|
9. |
R. R. Fatkieva, D. K. Levonevskiy, “Attack detection by means of singular spectrum analysis”, Tr. SPIIRAN, 25 (2013), 135–147 |
2
|
|
Organisations |
|
|
|
|