Follow
Andrey Shorov
Andrey Shorov
Unknown affiliation
Verified email at ieee.org
Title
Cited by
Cited by
Year
Agent-based modeling and simulation of botnets and botnet defense
I Kotenko, A Konovalov, A Shorov
Conference on Cyber Conflict. CCD COE Publications. Tallinn, Estonia, 21-44, 2010
702010
Agent‐based simulation of cooperative defence against botnets
I Kotenko, A Konovalov, A Shorov
Concurrency and Computation: Practice and Experience 24 (6), 573-588, 2012
522012
Analysis and evaluation of web pages classification techniques for inappropriate content blocking
I Kotenko, A Chechulin, A Shorov, D Komashinsky
Advances in Data Mining. Applications and Theoretical Aspects: 14th …, 2014
352014
Система имитационного моделирования для разработки и тестирования методов защиты от DDoS-атак с возможностью подключения реальных узлов
КА Борисенко, ЯА Бекенева, НН Шипилов, АВ Шоров
Безопасность информационных технологий 22 (4), 6-12, 2015
332015
5G testbed development for network slicing evaluation
A Shorov
2019 IEEE Conference of Russian Young Researchers in Electrical and …, 2019
302019
Self-learning method for DDoS detection model in cloud computing
A Rukavitsyn, K Borisenko, A Shorov
2017 IEEE Conference of Russian Young Researchers in Electrical and …, 2017
232017
Анализ биоинспирированных подходов для защиты компьютерных систем и сетей
ИВ Котенко, АВ Шоров, ФГ Нестерук
Информатика и автоматизация 18 (0), 19-73, 2011
232011
Efficient Distribution and Processing of Data for Parallelizing Data Mining in Mobile Clouds.
I Kholod, A Shorov, S Gorlatch
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 11 (1), 2-17, 2020
202020
Using technologies of OLAP and machine learning for validation of the numerical models of convective clouds
EN Stankova, AV Balakshiy, DA Petrov, AV Shorov, VV Korkhov
Computational Science and Its Applications--ICCSA 2016: 16th International …, 2016
172016
DDoS attacks detection in cloud computing using data mining techniques
K Borisenko, A Smirnov, E Novikova, A Shorov
Advances in Data Mining. Applications and Theoretical Aspects: 16th …, 2016
152016
Visualizing anomalous activity in the movement of critical infrastructure employees
ES Novikova, IN Murenin, AV Shorov
2017 IEEE Conference of Russian Young Researchers in Electrical and …, 2017
142017
Simulation of DDoS-attacks and protection mechanisms against them
Y Bekeneva, N Shipilov, K Borisenko, A Shorov
2015 IEEE NW Russia Young Researchers in Electrical and Electronic …, 2015
142015
Simulation-based study of botnets and defense mechanisms against them
AM Konovalov, IV Kotenko, AV Shorov
Journal of Computer and Systems Sciences International 52, 43-65, 2013
132013
The method of ensuring confidentiality and integrity data in cloud computing
AN Rukavitsyn, KA Borisenko, II Holod, AV Shorov
2017 XX IEEE International Conference on Soft Computing and Measurements …, 2017
122017
Investigation of website classification methods based on data mining techniques
AN Rukavitsyn, MS Kupriyanov, AV Shorov, IV Petukhov
2016 XIX IEEE international conference on soft computing and measurements …, 2016
122016
OLAP technology and machine learning as the tools for validation of the numerical models of convective clouds
EN Stankova, AV Balakshiy, DA Petrov, VV Korkhov, AV Shorov
International Journal of Business Intelligence and Data Mining 14 (1-2), 254-266, 2019
112019
Detecting the origin of DDoS attacks in openstack cloud platform using data mining techniques
K Borisenko, A Rukavitsyn, A Gurtov, A Shorov
Internet of Things, Smart Spaces, and Next Generation Networks and Systems …, 2016
112016
Имитационное моделирование механизмов защиты от бот-сетей.
ИВ Котенко, АМ Коновалов, АВ Шоров
Информатика и автоматизация 4 (19), 7-33, 2011
112011
Time series distributed analysis in IoT with ETL and data mining technologies
I Kholod, M Efimova, A Rukavitsyn, S Andrey
Internet of Things, Smart Spaces, and Next Generation Networks and Systems …, 2017
102017
A formally based parallelization of data mining algorithms for multi-core systems
I Kholod, A Shorov, E Titkov, S Gorlatch
The Journal of Supercomputing 75 (12), 7909-7920, 2019
82019
The system can't perform the operation now. Try again later.
Articles 1–20