default search action
Victor A. Skormin
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2017
- [c29]Emrah Korkmaz, Matthew Davis, Andrey M. Dolgikh, Victor A. Skormin:
Detection and Mitigation of Time Delay Injection Attacks on Industrial Control Systems with PLCs. MMM-ACNS 2017: 62-74 - [c28]Matthew Davis, Emrah Korkmaz, Andrey M. Dolgikh, Victor A. Skormin:
Resident Security System for Government/Industry Owned Computers. MMM-ACNS 2017: 185-194 - [e8]Jacek Rak, John Bay, Igor V. Kotenko, Leonard J. Popyack, Victor A. Skormin, Krzysztof Szczypiorski:
Computer Network Security - 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, Warsaw, Poland, August 28-30, 2017, Proceedings. Lecture Notes in Computer Science 10446, Springer 2017, ISBN 978-3-319-65126-2 [contents] - 2016
- [j3]Zachary Birnbaum, Andrey M. Dolgikh, Victor A. Skormin, Edward O'Brien, Daniel Muller, Christina Stracquodaine:
Unmanned Aerial Vehicle Security Using Recursive Parameter Estimation. J. Intell. Robotic Syst. 84(1-4): 107-120 (2016) - [c27]Emrah Korkmaz, Andrey M. Dolgikh, Matthew Davis, Victor A. Skormin:
ICS security testbed with delay attack case study. MILCOM 2016: 283-288 - 2014
- [j2]Andrey M. Dolgikh, Zachary Birnbaum, Bingwei Liu, Yu Chen, Victor A. Skormin:
Cloud security auditing based on behavioural modelling. Int. J. Bus. Process. Integr. Manag. 7(2): 137-152 (2014) - 2013
- [c26]Andrey M. Dolgikh, Zachary Birnbaum, Yu Chen, Victor A. Skormin:
Behavioral Modeling for Suspicious Process Detection in Cloud Computing Environments. MDM (2) 2013: 177-181 - [c25]Zachary Birnbaum, Bingwei Liu, Andrey M. Dolgikh, Yu Chen, Victor A. Skormin:
Cloud Security Auditing Based on Behavioral Modeling. SERVICES 2013: 268-273 - 2012
- [c24]Victor A. Skormin, Tomas Nykodym, Andrey M. Dolgikh, James Antonakos:
Customized Normalcy Profiles for the Detection of Targeted Attacks. EvoApplications 2012: 487-496 - [c23]Gulnara Abitova, Vladimir Nikulin, Victor A. Skormin, Mamirbek Beisenbi, Aliya Ainagulova:
Control System with High Robust Stability Characteristics Based on Catastrophe Function. ICECCS 2012: 273-279 - [c22]Andrey M. Dolgikh, Tomas Nykodym, Victor A. Skormin, Zachary Birnbaum:
Using Behavioral Modeling and Customized Normalcy Profiles as Protection against Targeted Cyber-Attacks. MMM-ACNS 2012: 191-202 - [e7]Igor V. Kotenko, Victor A. Skormin:
Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings. Lecture Notes in Computer Science 7531, Springer 2012, ISBN 978-3-642-33703-1 [contents] - 2011
- [c21]Andrey M. Dolgikh, Tomas Nykodym, Victor A. Skormin, James Antonakos:
Computer Network Testbed at Binghamton University. MILCOM 2011: 1146-1151 - [c20]Andrey M. Dolgikh, Tomas Nykodym, Victor A. Skormin, James Antonakos, M. Baimukhamedov:
Colored Petri nets as the enabling technology in intrusion detection systems. MILCOM 2011: 1297-1301 - [c19]Tomas Nykodym, Victor A. Skormin, Andrey M. Dolgikh, James Antonakos:
Automatic functionality detection in behavior-based IDS. MILCOM 2011: 1302-1307 - 2010
- [c18]Arnur G. Tokhtabayev, Victor A. Skormin, Andrey M. Dolgikh:
Behavioral Obfuscation in Malware and its Mitigation via Signature Generalization. Security and Management 2010: 375-385 - [c17]Arnur G. Tokhtabayev, Victor A. Skormin, Andrey M. Dolgikh:
Expressive, Efficient and Obfuscation Resilient Behavior Based IDS. ESORICS 2010: 698-715 - [e6]Igor V. Kotenko, Victor A. Skormin:
Computer Network Security, 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings. Lecture Notes in Computer Science 6258, Springer 2010, ISBN 978-3-642-14705-0 [contents]
2000 – 2009
- 2009
- [c16]Arnur G. Tokhtabayev, Victor A. Skormin, Andrey M. Dolgikh, Mamirbek Beisenbi, Moldir Kargaldayeva:
Detection of Specific Semantic Functionalities, such as Self-Replication Mechanism, in Malware Using Colored Petri Nets. Security and Management 2009: 645-651 - 2008
- [c15]Arnur G. Tokhtabayev, Victor A. Skormin, Andrey M. Dolgikh:
Detection of Worm Propagation Engines in the System Call Domain using Colored Petri Nets. IPCCC 2008: 59-68 - 2007
- [j1]Victor A. Skormin, Alexander Volynkin, Douglas H. Summerville, James Moronski:
Prevention of information attacks by run-time detection of self-replication in computer codes. J. Comput. Secur. 15(2): 273-302 (2007) - [c14]Arnur G. Tokhtabayev, Victor A. Skormin:
Non-Stationary Markov Models and Anomaly Propagation Analysis in IDS. IAS 2007: 203-208 - [c13]Alexander Volynkin, Victor A. Skormin:
Large-scale Reconfigurable Virtual Testbed for Information Security Experiments. TRIDENTCOM 2007: 1-9 - [e5]Vladimir Gorodetsky, Chengqi Zhang, Victor A. Skormin, Longbing Cao:
Autonomous Intelligent Systems: Multi-Agents and Data Mining, Second International Workshop, AIS-ADM 2007, St. Petersburg, Russia, June 3-5, 2007, Proceedings. Lecture Notes in Computer Science 4476, Springer 2007, ISBN 978-3-540-72838-2 [contents] - 2005
- [c12]Douglas H. Summerville, Victor A. Skormin, Alexander Volynkin, James Moronski:
Prevention of Information Attacks by Run-Time Detection of Self-replication in Computer Codes. MMM-ACNS 2005: 54-75 - [e4]Vladimir Gorodetsky, Jiming Liu, Victor A. Skormin:
Autonomous Intelligent Systems: Agents and Data Mining, International Workshop, AIS-ADM 2005, St. Petersburg, Russia, June 6-8, 2005, Proceedings. Lecture Notes in Computer Science 3505, Springer 2005, ISBN 3-540-26164-8 [contents] - [e3]Vladimir Gorodetsky, Igor V. Kotenko, Victor A. Skormin:
Computer Network Security, Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings. Lecture Notes in Computer Science 3685, Springer 2005, ISBN 3-540-29113-X [contents] - 2003
- [b1]Alexander O. Tarakanov, Victor A. Skormin, Svetlana P. Sokolova:
Immunocomputing - principles and applications. Springer 2003, ISBN 978-0-387-95533-9, pp. I-XI, 1-193 - [c11]Victor A. Skormin, James Moronski, Dennis L. McGee, Douglas H. Summerville:
Biological Approach to System Information Security (BASIS): A Multi-agent Approach to Information Security. CEEMAS 2003: 435-444 - [c10]Victor A. Skormin, Douglas H. Summerville, James Moronski:
Detecting Malicious Codes by the Presence of Their "Gene of Self-replication". MMM-ACNS 2003: 195-205 - [c9]Mike Elmore, Victor A. Skormin, Vladimir Nikulin:
A Pspice Optimal Design Tool Utilizing Genetic Optimization. Modelling and Simulation 2003: 372-379 - [e2]Vladimir Gorodetsky, Leonard J. Popyack, Victor A. Skormin:
Computer Network Security, Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings. Lecture Notes in Computer Science 2776, Springer 2003, ISBN 3-540-40797-9 [contents] - 2002
- [c8]Alexander O. Tarakanov, Victor A. Skormin:
Pattern recognition by immunocomputing. IEEE Congress on Evolutionary Computation 2002: 938-943 - 2001
- [c7]Sergey Edward Lyshevski, Richard D. Colgren, Victor A. Skormin:
High-performance electromechanical direct-drive actuators for flight vehicles. ACC 2001: 1345-1350 - [c6]Vladimir I. Gorodetski, Oleg Karsaev, Alexey Khabalov, Igor V. Kotenko, Leonard J. Popyack, Victor A. Skormin:
Agent-Based Model of Computer Network Security System: A Case Study. MMM-ACNS 2001: 39-50 - [c5]Victor A. Skormin, José G. Delgado-Frias, Dennis L. McGee, Joseph Giordano, Leonard J. Popyack, Vladimir I. Gorodetski, Alexander O. Tarakanov:
BASIS: A Biological Approach to System Information Security. MMM-ACNS 2001: 127-142 - [c4]Vladimir I. Gorodetski, Leonard J. Popyack, Vladimir Samoilov, Victor A. Skormin:
SVD-Based Approach to Transparent Embedding Data into Digital Images. MMM-ACNS 2001: 263-274 - [e1]Vladimir I. Gorodetski, Victor A. Skormin, Leonard J. Popyack:
Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security, International Workshop MMM-ACNS 2001, St. Petersburg, Russia, May 21-23, 2001, Proceedings. Lecture Notes in Computer Science 2052, Springer 2001, ISBN 3-540-42103-3 [contents] - 2000
- [c3]Vladimir I. Gorodetski, Igor V. Kotenko, Victor A. Skormin:
Integrated Multi-Agent Approach to Network Security Assurance: Models of Agents' Community. SEC 2000: 291-300
1990 – 1999
- 1999
- [c2]Vladimir I. Gorodetski, Igor V. Kotenko, Leonard J. Popyack, Victor A. Skormin:
Agent-based Model of Information Security System: Architecture and Framework for Coordinated Behavior Specification. CEEMAS 1999 - [c1]Vladimir I. Gorodetski, Leonard J. Popyack, Igor V. Kotenko, Victor A. Skormin:
Ontology-Based Multi-Agent Model of an Information Security System. RSFDGrC 1999: 528-532
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint