default search action
Dmitry P. Zegzhda
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j44]Dmitry P. Zegzhda, A. F. Suprun, V. G. Anisimov, A. V. Tebekin, E. G. Anisimov:
Methodological Approach to Construct Models for Predicting Indicators of Properties of Information Security Systems. Autom. Control. Comput. Sci. 57(8): 881-885 (2023) - [j43]R. A. Ognev, Dmitry P. Zegzhda:
Empirical Study of the Stability of a Linear Filter Based on the Neyman-Pearson Criterion to Changes in the Average Values. Autom. Control. Comput. Sci. 57(8): 933-937 (2023) - [j42]Daria S. Lavrova, V. M. Bogina, Dmitry P. Zegzhda, E. Yu. Pavlenko:
Probabilistic Approach to Estimate the Cyber Resistance of Mobile Networks Based on Their Connectivity. Autom. Control. Comput. Sci. 57(8): 1103-1115 (2023) - [j41]Evgeniy Y. Pavlenko, K. V. Vasil'eva, Daria S. Lavrova, Dmitry P. Zegzhda:
Counteraction the cybersecurity threats of the in-vehicle local network. J. Comput. Virol. Hacking Tech. 19(3): 399-408 (2023) - 2022
- [j40]R. A. Ognev, E. V. Zhukovskii, Dmitry P. Zegzhda, A. N. Kiselev:
Detecting Malicious Executable Files Based on Static-Dynamic Analysis Using Machine Learning. Autom. Control. Comput. Sci. 56(8): 852-864 (2022) - [j39]A. I. Sergadeeva, Daria S. Lavrova, Dmitry P. Zegzhda:
Bank Fraud Detection with Graph Neural Networks. Autom. Control. Comput. Sci. 56(8): 865-873 (2022) - 2021
- [j38]Andrei D. Dakhnovich, Dmitry A. Moskvin, Dmitry P. Zegzhda:
Requirements on Providing a Sustainability of Industrial Internet of Things. Autom. Control. Comput. Sci. 55(8): 956-961 (2021) - [j37]Andrei D. Dakhnovich, Dmitry A. Moskvin, Dmitry P. Zegzhda:
Using Security-through-Obscurity Principle in an Industrial Internet of Things. Autom. Control. Comput. Sci. 55(8): 1061-1067 (2021) - [j36]R. A. Ognev, E. V. Zhukovskii, Dmitry P. Zegzhda:
Detection of Malicious Executable Files Based on Clustering of Activities. Autom. Control. Comput. Sci. 55(8): 1092-1098 (2021) - [j35]Maria A. Poltavtseva, Alexander A. Shelupanov, Dmitriy Bragin, Dmitry P. Zegzhda, Elena Alexandrova:
Key Concepts of Systemological Approach to CPS Adaptive Information Security Monitoring. Symmetry 13(12): 2425 (2021) - [j34]Dmitry P. Zegzhda, Evgeny Pavlenko, Elena B. Aleksandrova:
Modelling Artificial Immunization Processes to Counter Cyberthreats. Symmetry 13(12): 2453 (2021) - [c33]Andrei D. Dakhnovich, Dmitrii A. Moskvin, Dmitry P. Zegzhda:
A Necessary Condition for Industrial Internet of Things Sustainability. MobiSec 2021: 79-89 - 2020
- [j33]Dmitry P. Zegzhda, Daria S. Lavrova, Evgeny Pavlenko, Anna A. Shtyrkina:
Cyber Attack Prevention Based on Evolutionary Cybernetics Approach. Symmetry 12(11): 1931 (2020) - [c32]Haejin Cho, Sangwon Lim, Viacheslav Belenko, Maxim O. Kalinin, Dmitry P. Zegzhda, Ellada Nuralieva:
Application and improvement of sequence alignment algorithms for intrusion detection in the Internet of Things. ICPS 2020: 93-97
2010 – 2019
- 2019
- [j32]Daria S. Lavrova, Elizaveta Zaitseva, Dmitry P. Zegzhda:
Approach to Presenting Network Infrastructure of Cyberphysical Systems to Minimize the Cyberattack Neutralization Time. Autom. Control. Comput. Sci. 53(5): 387-392 (2019) - [j31]E. V. Malyshev, Dmitry A. Moskvin, Dmitry P. Zegzhda:
Application of an Artificial Neural Network for Detection of Attacks in VANETs. Autom. Control. Comput. Sci. 53(8): 889-894 (2019) - [j30]Maria A. Poltavtseva, Dmitry P. Zegzhda, Maxim O. Kalinin:
Big Data Management System Security Threat Model. Autom. Control. Comput. Sci. 53(8): 903-913 (2019) - [j29]Elizaveta Zaitseva, Dmitry P. Zegzhda, Maria A. Poltavtseva:
Use of Graph Representation and Case Analysis to Assess the Security of Computer Systems. Autom. Control. Comput. Sci. 53(8): 937-947 (2019) - [j28]Andrei D. Dakhnovich, Dmitry A. Moskvin, Dmitry P. Zegzhda:
An Approach to Building Cyber-Resistant Interactions in the Industrial Internet of Things. Autom. Control. Comput. Sci. 53(8): 948-953 (2019) - [j27]Dmitry P. Zegzhda, Maxim O. Kalinin, M. V. Levykin:
Actual Vulnerabilities of Industrial Automation Protocols of an Open Platform Communications Series. Autom. Control. Comput. Sci. 53(8): 972-979 (2019) - [j26]R. A. Ognev, E. V. Zhukovskii, Dmitry P. Zegzhda:
Clustering of Malicious Executable Files Based on the Sequence Analysis of System Calls. Autom. Control. Comput. Sci. 53(8): 1045-1055 (2019) - [c31]Daria S. Lavrova, Dmitry P. Zegzhda, Anastasiia Yarmak:
Using GRU neural network for cyber-attack detection in automated process control systems. BlackSeaCom 2019: 1-3 - [c30]Evgeny Pavlenko, Dmitry P. Zegzhda, Anna A. Shtyrkina:
Estimating the sustainability of cyber-physical systems based on spectral graph theory. BlackSeaCom 2019: 1-5 - [c29]Maria A. Poltavtseva, Dmitry P. Zegzhda, Evgeniy Y. Pavlenko:
High-performance NIDS Architecture for Enterprise Networking. BlackSeaCom 2019: 1-3 - [c28]Dmitry P. Zegzhda, Daria S. Lavrova, Aleksei Khushkeev:
Detection of information security breaches in distributed control systems based on values prediction of multidimensional time series. ICPS 2019: 780-784 - [c27]Evgeny Pavlenko, Dmitry P. Zegzhda, Maria A. Poltavtseva:
Ensuring the sustainability of cyberphysical systems based on dynamic reconfiguration. ICPS 2019: 785-789 - 2018
- [j25]Dmitry P. Zegzhda, Denis V. Ivanov, Dmitry A. Moskvin, A. A. Ivanov:
The Use of Adjacency Series for Recognition of Prefractal Graphs in Assessing VANET Cybersecurity. Autom. Control. Comput. Sci. 52(8): 901-905 (2018) - [j24]Dmitry P. Zegzhda, E. Yu. Pavlenko:
Cyber-sustainability of Software-Defined Networks Based on Situational Management. Autom. Control. Comput. Sci. 52(8): 984-992 (2018) - [j23]Dmitry P. Zegzhda, Yu. S. Vasil'ev, Maria A. Poltavtseva:
Approaches to Modeling the Security of Cyberphysical Systems. Autom. Control. Comput. Sci. 52(8): 1000-1009 (2018) - [j22]Artem S. Konoplev, Alexey G. Busygin, Dmitry P. Zegzhda:
A Blockchain Decentralized Public Key Infrastructure Model. Autom. Control. Comput. Sci. 52(8): 1017-1021 (2018) - [j21]Dmitry P. Zegzhda, E. S. Usov, V. A. Nikol'skii, E. Yu. Pavlenko:
Ensuring Secure Data Input/Output Operations for SGX ENCLAVE. Autom. Control. Comput. Sci. 52(8): 1036-1041 (2018) - [j20]Andrei D. Dakhnovich, Dmitry A. Moskvin, Dmitry P. Zegzhda:
Analysis of the Information Security Threats in the Digital Production Networks. Autom. Control. Comput. Sci. 52(8): 1071-1075 (2018) - [j19]Alexey G. Busygin, Artem S. Konoplev, Dmitry P. Zegzhda:
Providing Stable Operation of Self-Organizing Cyber-Physical System via Adaptive Topology Management Methods Using Blockchain-Like Directed Acyclic Graph. Autom. Control. Comput. Sci. 52(8): 1080-1083 (2018) - [j18]Yu. S. Vasil'ev, Dmitry P. Zegzhda, Maria A. Poltavtseva:
Problems of Security in Digital Production and Its Resistance to Cyber Threats. Autom. Control. Comput. Sci. 52(8): 1090-1100 (2018) - [j17]Dmitry P. Zegzhda, Dmitry A. Moskvin, A. V. Myasnikov:
Assurance of Cyber Resistance of the Distributed Data Storage Systems Using the Blockchain Technology. Autom. Control. Comput. Sci. 52(8): 1111-1116 (2018) - [j16]Andrei D. Dakhnovich, Dmitry P. Zegzhda, Dmitry A. Moskvin:
Applying Garlic Routing to Guarantee Secure Collaboration of Segments in a Digital Manufacturing Network. Autom. Control. Comput. Sci. 52(8): 1127-1133 (2018) - [j15]E. S. Usov, V. A. Nikol'skii, E. Yu. Pavlenko, Dmitry P. Zegzhda:
Architecture of the Protected Cloud Data Storage Using Intel SGX Technology. Autom. Control. Comput. Sci. 52(8): 1144-1149 (2018) - [j14]Dmitry P. Zegzhda, E. Yu. Pavlenko:
Digital Manufacturing Security Indicators. Autom. Control. Comput. Sci. 52(8): 1150-1159 (2018) - [c26]Evgeny Pavlenko, Dmitry P. Zegzhda:
Sustainability of cyber-physical systems in the context of targeted destructive influences. ICPS 2018: 830-834 - [c25]Peter D. Zegzhda, Dmitry P. Zegzhda, Evgeny Pavlenko, Gleb Ignatev:
Applying deep learning techniques for Android malware detection. SIN 2018: 7:1-7:8 - [c24]Alexey G. Busygin, Artem S. Konoplev, Maxim O. Kalinin, Dmitry P. Zegzhda:
Floating Genesis Block Enhancement for Blockchain Based Routing Between Connected Vehicles and Software-defined VANET Security Services. SIN 2018: 24:1-24:2 - 2017
- [j13]Dmitry P. Zegzhda, Evgeny Pavlenko:
Cyber-physical system homeostatic security management. Autom. Control. Comput. Sci. 51(8): 805-816 (2017) - [j12]Dmitry P. Zegzhda, Maria A. Poltavtseva, Daria S. Lavrova:
Systematization and security assessment of cyber-physical systems. Autom. Control. Comput. Sci. 51(8): 835-843 (2017) - [j11]Dmitry P. Zegzhda, E. S. Usov, V. A. Nikol'skii, Evgeny Pavlenko:
Use of Intel SGX to ensure the confidentiality of data of cloud users. Autom. Control. Comput. Sci. 51(8): 848-854 (2017) - [j10]Dmitry P. Zegzhda, Dmitry A. Moskvin, Andrei D. Dakhnovich:
Protection of Wi-Fi network users against rogue access points. Autom. Control. Comput. Sci. 51(8): 978-984 (2017) - [c23]Peter D. Zegzhda, Dmitry P. Zegzhda, Evgeny Pavlenko, Andrew Dremov:
Detecting Android application malicious behaviors based on the analysis of control flows and data flows. SIN 2017: 280-283 - [c22]Dmitry P. Zegzhda, Peter D. Zegzhda, Alexander I. Pechenkin, Maria A. Poltavtseva:
Modeling of information systems to their security evaluation. SIN 2017: 295-298 - 2016
- [j9]Elena B. Aleksandrova, Dmitry P. Zegzhda, Artem S. Konoplev:
Applying the group signature for entity authentication in distributed grid computing networks. Autom. Control. Comput. Sci. 50(8): 739-742 (2016) - [j8]Dmitry P. Zegzhda, Tatiana V. Stepanova, A. F. Suprun:
Multiagent system controllability evaluation using the multilevel structure of the graph of agents. Autom. Control. Comput. Sci. 50(8): 809-812 (2016) - [j7]Dmitry P. Zegzhda:
Sustainability as a criterion for information security in cyber-physical systems. Autom. Control. Comput. Sci. 50(8): 813-819 (2016) - [c21]Maxim O. Kalinin, Peter D. Zegzhda, Dmitry P. Zegzhda, Yuri Vasiliev, Viacheslav Belenko:
Software defined security for vehicular ad hoc networks. ICTC 2016: 533-537 - [c20]Andrey Yu. Chernov, Artem S. Konoplev, Dmitry P. Zegzhda:
Applying Virtualization Technology for the Construction of Trusted Executable Environment. SIN 2016: 65-66 - [c19]Peter D. Zegzhda, Dmitry P. Zegzhda, Maxim O. Kalinin, Alexander I. Pechenkin, Alexander Minin, Daria S. Lavrova:
Safe Integration of SIEM Systems with Internet of Things: Data Aggregation, Integrity Control, and Bioinspired Safe Routing. SIN 2016: 81-87 - 2015
- [j6]Dmitry P. Zegzhda, Tatiana V. Stepanova:
Thermodynamic approach to modeling multi-agent systems in cyberspace. Autom. Control. Comput. Sci. 49(8): 622-626 (2015) - [j5]Peter D. Zegzhda, Dmitry P. Zegzhda, Tatiana V. Stepanova:
Approach to the construction of the generalized functional-semantic cyber security model. Autom. Control. Comput. Sci. 49(8): 627-633 (2015) - [j4]Dmitry P. Zegzhda, Tatiana V. Stepanova:
Approach to APCS protection from cyber threats. Autom. Control. Comput. Sci. 49(8): 659-664 (2015) - [j3]Dmitry A. Moskvin, Dmitry P. Zegzhda, Alexey V. Nikolskiy:
Secure processor architecture modeling for large-scale systems. Autom. Control. Comput. Sci. 49(8): 684-689 (2015) - [j2]N. S. Vert, A. S. Volkova, Dmitry P. Zegzhda, Maxim O. Kalinin:
Maintenance of sustainable operation of pipeline-parallel computing systems in the cloud environment. Autom. Control. Comput. Sci. 49(8): 713-720 (2015) - [c18]Tatiana V. Stepanova, Dmitry P. Zegzhda:
Large-scale systems security evolution: control theory approach. SIN 2015: 135-141 - 2014
- [c17]Tatiana V. Stepanova, Dmitry P. Zegzhda:
Applying Large-scale Adaptive Graphs to Modeling Internet of Things Security. SIN 2014: 479 - 2012
- [c16]Dmitry P. Zegzhda, Tatiana V. Stepanova:
Stochastic Model of Interaction between Botnets and Distributed Computer Defense Systems. MMM-ACNS 2012: 218-225 - [c15]Peter D. Zegzhda, Dmitry P. Zegzhda, Maxim O. Kalinin, Artem S. Konoplev:
Security Modeling of Grid Systems Using Petri Nets. MMM-ACNS 2012: 299-308 - [c14]Peter D. Zegzhda, Dmitry P. Zegzhda, Alexey V. Nikolskiy:
Using Graph Theory for Cloud System Security Modeling. MMM-ACNS 2012: 309-318 - 2010
- [c13]Dmitry P. Zegzhda, Ekaterina Rudina:
Virtual Environment Security Modeling. MMM-ACNS 2010: 329-336 - [c12]Dmitry P. Zegzhda, Peter D. Zegzhda, Maxim O. Kalinin:
Clarifying Integrity Control at the Trusted Information Environment. MMM-ACNS 2010: 337-344 - [c11]Tatiana V. Stepanova, Maxim O. Kalinin, Peter Baranov, Dmitry P. Zegzhda:
Homogeneity analysis of power consumption for information security purposes. SIN 2010: 113-117
2000 – 2009
- 2008
- [c10]Dmitry P. Zegzhda, Maxim O. Kalinin, Alexander Vovk:
"Linux over OSMOS": the Secure Hybrid Operating System. Enterprise Information Systems and Web Technologies 2008: 47-54 - [c9]Dmitry P. Zegzhda, Maxim O. Kalinin, Olga Savelyeva:
The Use of Conference Control to Design a Protected Videoconference System. Enterprise Information Systems and Web Technologies 2008: 55-60 - [c8]Dmitry P. Zegzhda, Maxim O. Kalinin:
Security Assurance for the Attribute-Based Access Control Systems. Enterprise Information Systems and Web Technologies 2008: 147-154 - 2007
- [c7]Dmitry P. Zegzhda, Maxim O. Kalinin:
Logical Security Evaluation of Real-World Operating Systems. Enterprise Information Systems and Web Technologies 2007: 234-241 - 2006
- [j1]Il-Gon Kim, Miyoung Kang, Jin-Young Choi, Peter D. Zegzhda, Maxim O. Kalinin, Dmitry P. Zegzhda, Inhye Kang:
Formal Verification of Security Model Using SPR Tool. Comput. Artif. Intell. 25(5): 353-368 (2006) - 2005
- [c6]Dmitry P. Zegzhda, Alex M. Vovk:
Secure Hybrid Operating System "Linux over Fenix". MMM-ACNS 2005: 272-285 - [c5]Peter D. Zegzhda, Dmitry P. Zegzhda, Maxim O. Kalinin:
Vulnerabilities Detection in the Configurations of MS Windows Operating System. MMM-ACNS 2005: 339-351 - [c4]Peter D. Zegzhda, Dmitry P. Zegzhda, Maxim O. Kalinin:
Detection of the Operating System Configuration Vulnerabilities with Safety Evaluation Facility. WOSIS 2005: 263-276 - 2003
- [c3]Peter D. Zegzhda, Dmitry P. Zegzhda, Maxim O. Kalinin:
Logical Resolving for Security Evaluation. MMM-ACNS 2003: 147-156 - 2001
- [c2]Peter D. Zegzhda, Dmitry P. Zegzhda:
Secure Systems Design Technology. MMM-ACNS 2001: 63-71 - [c1]Dmitry P. Zegzhda, Pavel G. Stepanov, Alexey D. Otavin:
Fenix Secure Operating System: Principles, Models and Architecture. MMM-ACNS 2001: 207-218
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:59 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint