Evgeny  Yu. Pavlenko
Evgeny Yu. Pavlenko
Affiliation
Peter the Great St. Petersburg Polytechnic University
Degree
PhD in Technical Sciences
Publications

Analysis of methods for detecting malicious software using large language models and eBPF technology

Software security
  • Year: 2025
  • Issue: 3
  • 15
  • 666
  • Pages: 30-39

Automated security analysis of software for the Android operating system

  • Year: 2025
  • Issue: Спецвыпуск
  • 2
  • 437
  • Pages: 112-123

Cyber resilience of self-organizing cyber-physical systems

Information security application
  • Year: 2024
  • Issue: 1
  • 2
  • 461
  • Pages: 36-49

Graph self-regulation of various types of networks with adaptive topology

Information security application
  • Year: 2024
  • Issue: 1
  • 3
  • 440
  • Pages: 70-79

IMMUNIZATION OF COMPLEX NETWORKS: TOPOLOGY AND METHODS

Network and telecommunication security
  • Year: 2022
  • Issue: 1
  • 1
  • 428
  • Pages: 41-50

Ensuring information security of vanets based on early detection of malicious nodes

Critical information infrastructure security
  • Year: 2024
  • Issue: 2
  • 0
  • 323
  • Pages: 95-103

Analysis and prediction of states of industrial networks with adaptive topology based on network motifs

Cyber-physic systems security
  • Year: 2024
  • Issue: 3
  • 1
  • 333
  • Pages: 94-108

Analysis of methods for attaching malware at the level of security rings of x86_64 processors

Software security
  • Year: 2024
  • Issue: 4
  • 2
  • 334
  • Pages: 9-21

Intelligent synthesis of cyber-resilient network structures: methods, experiments and architectural implementation

  • Year: 2024
  • Issue: Спецвыпуск
  • 0
  • 319
  • Pages: 76-91

Criteria for synthesizing cyber resilient network structures

  • Year: 2024
  • Issue: Спецвыпуск
  • 0
  • 306
  • Pages: 92-103

Development of a mechanism to control message integrity on the local network of vehicles

Cyber-physic systems security
  • Year: 2021
  • Issue: 4
  • 0
  • 293
  • Pages: 91-100

Artificial immunization in cybersecurity duties

Cyber-physic systems security
  • Year: 2021
  • Issue: 4
  • 1
  • 317
  • Pages: 101-111

Detection of network attacks in software-defined networks using isolating forest algorithm

Network and telecommunication security
  • Year: 2021
  • Issue: 1
  • 0
  • 320
  • Pages: 62-78

Using the NEAT-hypercube mechanism for cyberattack detection in Internet of Things

Information security cyber-physic systems
  • Year: 2021
  • Issue: 1
  • 0
  • 329
  • Pages: 109-116

Anomaly detection in cyber-physical systems using graph neural networks

Network and telecommunication security
  • Year: 2021
  • Issue: 2
  • 2
  • 352
  • Pages: 21-40

ARTIFICIAL IMMUNIZATION OF TECHNICAL SYSTEMS TO ENSURE THEIR CYBERSECURITY

Information security application
  • Year: 2023
  • Issue: 1
  • 3
  • 446
  • Pages: 9-16

Identification of vulnerabilities in software for ARM processors using symbological execution

Software security
  • Year: 2021
  • Issue: 3
  • 1
  • 223
  • Pages: 9-15

IMMUNIZATION OF COMPLEX NETWORKS: A SYSTEM OF DIFFERENTIAL EQUATIONS AND DYNAMIC VARIATION

Critical information infrastructure security
  • Year: 2022
  • Issue: 2
  • 0
  • 209
  • Pages: 65-72

Approaches to building situational control systems for cyberphysical systems overview

Cyber-physic systems security
  • Year: 2021
  • Issue: 3
  • 0
  • 226
  • Pages: 137-144

COMPARISON OF THE EFFECTIVENESS OF ANOMALY DETECTION BY MACHINE LEARNING ALGORITHMS WITHOUT A TEACHER

Machine learning and knowledge control systems
  • Year: 2022
  • Issue: 2
  • 0
  • 220
  • Pages: 135-147

A probabilistic approach to assessing the cyber resilience of mobile networks based on their connectivity

Cyber-physic systems security
  • Year: 2023
  • Issue: 2
  • 0
  • 186
  • Pages: 123-139

METHODS OF COMPUTER NETWORK CLUSTERING IN CYBERSECURITY TASKS

Information security application
  • Year: 2022
  • Issue: 3
  • 0
  • 184
  • Pages: 36-44

SYSTEMATIZATION OF CYBER THREATS TO LARGE-SCALE SYSTEMS WITH ADAPTIVE NETWORK TOPOLOGY

Critical information infrastructure security
  • Year: 2022
  • Issue: 3
  • 0
  • 181
  • Pages: 55-67

A FUNCTIONING MODEL OF ADAPTIVE NETWORK TOPOLOGY OF LARGE-SCALE SYSTEMS BASED ON DYNAMIC GRAPH THEORY

Critical information infrastructure security
  • Year: 2022
  • Issue: 3
  • 1
  • 184
  • Pages: 68-79

CLUSTERING OF COMPUTER NETWORKS BASED ON THE BEE COLONY ALGORITHM

Information security application
  • Year: 2022
  • Issue: 4
  • 0
  • 172
  • Pages: 35-42

Artificial immunization in hierarchical and peer-to-peer networks for protection against cyber threats

Network and telecommunication security
  • Year: 2023
  • Issue: 3
  • 1
  • 201
  • Pages: 117-125

Analysis of cyber threat intelligence information exchange systems

Information security application
  • Year: 2023
  • Issue: 4
  • 0
  • 180
  • Pages: 19-30