Follow
Maxim Kolomeets
Maxim Kolomeets
Other namesMaxim Kolomeec, Maksim Kalameyets, Максим Коломеец
Verified email at newcastle.ac.uk - Homepage
Title
Cited by
Cited by
Year
Comparative study of machine learning methods for in-vehicle intrusion detection
I Berger, R Rieke, M Kolomeets, A Chechulin, I Kotenko
International Workshop on Security and Privacy Requirements Engineering, 85-101, 2018
502018
Choosing models for security metrics visualization
M Kolomeec, G Gonzalez-Granadillo, E Doynikova, A Chechulin, ...
Computer Network Security: 7th International Conference on Mathematical …, 2017
412017
Обзор методологических примитивов для поэтапного построения модели визуализации данных
МВ Коломеец, АА Чечулин, ИВ Котенко
Информатика и автоматизация 5 (42), 232-257, 2015
332015
Комбинированная методика проектирования защищенных встроенных устройств на примере системы охраны периметра
ВА Десницкий, АА Чечулин, ИВ Котенко, ДС Левшун, МВ Коломеец
Информатика и автоматизация 48 (0), 5-31, 2016
312016
A visual analytics approach for the cyber forensics based on different views of the network traffic.
IV Kotenko, M Kolomeets, A Chechulin, Y Chevalier
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 9 (2), 57-73, 2018
302018
Technique of Data Visualization: Example of Network Topology Display for Security Monitoring.
M Kolomeec, A Chechulin, A Pronoza, IV Kotenko
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 7 (1), 58-78, 2016
282016
Analysis of the malicious bots market
M Kolomeets, A Chechulin
2021 29th conference of open innovations association (FRUCT), 199-205, 2021
222021
Combined design technique for secure embedded devices exemplified by a perimeter protection system
V Desnitsky, AA Chechulin, IV Kotenko, DS Levshun, MV Kolomeec
Informatics and Automation 48, 5-31, 2016
222016
Bot detection by friends graph in social networks.
M Kolomeets, A Chechulin, IV Kotenko
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 12 (2), 141-159, 2021
212021
Application of a technique for secure embedded device design based on combining security components for creation of a perimeter protection system
V Desnitsky, A Chechulin, I Kotenko, D Levshun, M Kolomeec
2016 24th Euromicro International Conference on Parallel, Distributed, and …, 2016
202016
Methodological Primitives for Phased Construction of Data Visualization Models
M Kolomeec, A Chechulin, I Kotenko
Journal of Internet Services and Information Security 5 (4), 60-84, 2015
182015
Access control visualization using triangular matrices
M Kolomeets, A Chechulin, I Kotenko, I Saenko
2019 27th Euromicro International Conference on Parallel, Distributed and …, 2019
152019
Camouflaged bot detection using the friend list
M Kolomeets, O Tushkanova, D Levshun, A Chechulin
2021 29th Euromicro international conference on parallel, distributed and …, 2021
142021
Visualization model for monitoring of computer networks security based on the analogue of voronoi diagrams
M Kolomeets, A Chechulin, I Kotenko
Availability, Reliability, and Security in Information Systems: IFIP WG 8.4 …, 2016
142016
Методика визуализации метрик кибербезопасности
МВ Коломеец, АА Чечулин, ЕВ Дойникова, ИВ Котенко
Известия высших учебных заведений. Приборостроение 61 (10), 873-880, 2018
132018
Social networks analysis by graph algorithms on the example of the VKontakte social network.
M Kolomeets, A Chechulin, IV Kotenko
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 10 (2), 55-75, 2019
112019
Approach to identification and analysis of information sources in social networks
L Vitkova, M Kolomeets
Intelligent Distributed Computing XIII, 285-293, 2020
102020
Методика визуализации топологии компьютерной сети для мониторинга безопасности
МВ Коломеец, АА Чечулин, ИВ Котенко
Известия высших учебных заведений. Приборостроение 59 (10), 807-812, 2016
102016
Visual analysis of CAN bus traffic injection using radial bar charts
M Kolomeets, A Chechulin, I Kotenko
2018 IEEE Industrial Cyber-Physical Systems (ICPS), 841-846, 2018
92018
Complex online harms and the smart home: A scoping review
S Olabode, R Owens, VN Zhang, J Copilah-Ali, M Kolomeets, H Wu, ...
Future Generation Computer Systems, 2023
82023
The system can't perform the operation now. Try again later.
Articles 1–20