Latest issues
- 2025, Issue 4
- 2025, Issue 3
- 2025, Issue Спецвыпуск
- 2025, Issue 2
Evgeny Yu. Pavlenko
Affiliation
Peter the Great St. Petersburg Polytechnic University
Degree
PhD in Technical Sciences
Publications
Orcid ID
0000-0003-1345-1874
Analysis of methods for detecting malicious software using large language models and eBPF technology
- Year: 2025
- Issue: 3
- 15
- 666
- Pages: 30-39
Automated security analysis of software for the Android operating system
- Year: 2025
- Issue: Спецвыпуск
- 2
- 437
- Pages: 112-123
Graph self-regulation of various types of networks with adaptive topology
- Year: 2024
- Issue: 1
- 3
- 440
- Pages: 70-79
Ensuring information security of vanets based on early detection of malicious nodes
- Year: 2024
- Issue: 2
- 0
- 323
- Pages: 95-103
Analysis and prediction of states of industrial networks with adaptive topology based on network motifs
- Year: 2024
- Issue: 3
- 1
- 333
- Pages: 94-108
Analysis of methods for attaching malware at the level of security rings of x86_64 processors
- Year: 2024
- Issue: 4
- 2
- 334
- Pages: 9-21
Intelligent synthesis of cyber-resilient network structures: methods, experiments and architectural implementation
- Year: 2024
- Issue: Спецвыпуск
- 0
- 319
- Pages: 76-91
Criteria for synthesizing cyber resilient network structures
- Year: 2024
- Issue: Спецвыпуск
- 0
- 306
- Pages: 92-103
Development of a mechanism to control message integrity on the local network of vehicles
- Year: 2021
- Issue: 4
- 0
- 293
- Pages: 91-100
Detection of network attacks in software-defined networks using isolating forest algorithm
- Year: 2021
- Issue: 1
- 0
- 320
- Pages: 62-78
Using the NEAT-hypercube mechanism for cyberattack detection in Internet of Things
- Year: 2021
- Issue: 1
- 0
- 329
- Pages: 109-116
Anomaly detection in cyber-physical systems using graph neural networks
- Year: 2021
- Issue: 2
- 2
- 352
- Pages: 21-40
ARTIFICIAL IMMUNIZATION OF TECHNICAL SYSTEMS TO ENSURE THEIR CYBERSECURITY
- Year: 2023
- Issue: 1
- 3
- 446
- Pages: 9-16
Identification of vulnerabilities in software for ARM processors using symbological execution
- Year: 2021
- Issue: 3
- 1
- 223
- Pages: 9-15
IMMUNIZATION OF COMPLEX NETWORKS: A SYSTEM OF DIFFERENTIAL EQUATIONS AND DYNAMIC VARIATION
- Year: 2022
- Issue: 2
- 0
- 209
- Pages: 65-72
Approaches to building situational control systems for cyberphysical systems overview
- Year: 2021
- Issue: 3
- 0
- 226
- Pages: 137-144
COMPARISON OF THE EFFECTIVENESS OF ANOMALY DETECTION BY MACHINE LEARNING ALGORITHMS WITHOUT A TEACHER
- Year: 2022
- Issue: 2
- 0
- 220
- Pages: 135-147
A probabilistic approach to assessing the cyber resilience of mobile networks based on their connectivity
- Year: 2023
- Issue: 2
- 0
- 186
- Pages: 123-139
METHODS OF COMPUTER NETWORK CLUSTERING IN CYBERSECURITY TASKS
- Year: 2022
- Issue: 3
- 0
- 184
- Pages: 36-44
SYSTEMATIZATION OF CYBER THREATS TO LARGE-SCALE SYSTEMS WITH ADAPTIVE NETWORK TOPOLOGY
- Year: 2022
- Issue: 3
- 0
- 181
- Pages: 55-67
A FUNCTIONING MODEL OF ADAPTIVE NETWORK TOPOLOGY OF LARGE-SCALE SYSTEMS BASED ON DYNAMIC GRAPH THEORY
- Year: 2022
- Issue: 3
- 1
- 184
- Pages: 68-79
CLUSTERING OF COMPUTER NETWORKS BASED ON THE BEE COLONY ALGORITHM
- Year: 2022
- Issue: 4
- 0
- 172
- Pages: 35-42
Artificial immunization in hierarchical and peer-to-peer networks for protection against cyber threats
- Year: 2023
- Issue: 3
- 1
- 201
- Pages: 117-125
Analysis of cyber threat intelligence information exchange systems
- Year: 2023
- Issue: 4
- 0
- 180
- Pages: 19-30