default search action
Alexander I. Tolstoy
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [c32]Natalia G. Miloslavskaya, Alexander I. Tolstoy:
How to Overcome Staff Shortage in Professionals for SOCs and NSICs. World Conference on Information Security Education 2022: 31-45 - 2021
- [c31]Natalia G. Miloslavskaya, Alexander I. Tolstoy:
Formation of General Professional Competencies in Academic Training of Information Security Professionals. World Conference on Information Security Education 2021: 13-26 - 2020
- [j2]Natalia G. Miloslavskaya, Alexander I. Tolstoy:
IoTBlockSIEM for information security incident management in the internet of things ecosystem. Clust. Comput. 23(3): 1911-1925 (2020) - [c30]Andrey Vybornov, Natalia G. Miloslavskaya, Alexander I. Tolstoy:
Designing Competency Models for Cybersecurity Professionals for the Banking Sector. WISE 2020: 81-95
2010 – 2019
- 2019
- [j1]Natalia G. Miloslavskaya, Alexander I. Tolstoy:
Internet of Things: information security challenges and solutions. Clust. Comput. 22(1): 103-119 (2019) - [c29]Alexander I. Tolstoy, Natalia G. Miloslavskaya:
Andragogy as a Scientific Basis for Training Professionals in Information Security. World Conference on Information Security Education 2019: 72-85 - [c28]Natalia G. Miloslavskaya, Alexander I. Tolstoy:
Blockchain and Its Security: Ignore or Insert into Academic Training? World Conference on Information Security Education 2019: 102-113 - [c27]Natalia G. Miloslavskaya, Alexander I. Tolstoy:
New SIEM System for the Internet of Things. WorldCIST (2) 2019: 317-327 - [c26]Natalia G. Miloslavskaya, Andrey Nikiforov, Kirill Plaksiy, Alexander I. Tolstoy:
Standardization Issues for the Internet of Things. WorldCIST (2) 2019: 328-338 - 2018
- [c25]Natalia G. Miloslavskaya, Alexander I. Tolstoy:
Developing Hands-On Laboratory Works for the "Information Security Incident Management" Discipline. World Conference on Information Security Education 2018: 28-39 - [c24]Vladimir Budzko, Natalia G. Miloslavskaya, Alexander I. Tolstoy:
Forming the Abilities of Designing Information Security Maintenance Systems in the Implementation of Educational Programmes in Information Security. World Conference on Information Security Education 2018: 108-120 - 2017
- [c23]Natalia G. Miloslavskaya, Alexander I. Tolstoy:
Ensuring Information Security for Internet of Things. FiCloud 2017: 62-69 - [c22]Natalia G. Miloslavskaya, Victor Morozov, Alexander I. Tolstoy, Dennis Khassan:
DLP as an Integral Part of Network Security Intelligence Center. FiCloud 2017: 297-304 - [c21]Natalia G. Miloslavskaya, Alexander I. Tolstoy:
Designing Degree Programmes for Bachelors and Masters in Information Security. World Conference on Information Security Education 2017: 14-26 - [c20]Natalia G. Miloslavskaya, Alexander I. Tolstoy:
ISO/IEC Competence Requirements for Information Security Professionals. World Conference on Information Security Education 2017: 135-146 - [c19]Natalia G. Miloslavskaya, Alexander I. Tolstoy, Anton Migalin:
"Network Security Intelligence" Educational and Research Center. World Conference on Information Security Education 2017: 157-168 - 2016
- [c18]Sergey Zapechnikov, Natalia G. Miloslavskaya, Alexander I. Tolstoy:
Analysis of Intrusion Detection and Prevention Systems as Queueing Services. AINA Workshops 2016: 855-860 - [c17]Natalia G. Miloslavskaya, Alexander I. Tolstoy:
Big Data, Fast Data and Data Lake Concepts. BICA 2016: 300-305 - [c16]Natalia G. Miloslavskaya, Alexander I. Tolstoy:
State-Level Views on Professional Competencies in the Field of IoT and Cloud Information Security. FiCloud Workshops 2016: 83-90 - [c15]Natalia G. Miloslavskaya, Alexander I. Tolstoy:
Application of Big Data, Fast Data, and Data Lake Concepts to Information Security Issues. FiCloud Workshops 2016: 148-153 - [c14]Natalia G. Miloslavskaya, Alexander I. Tolstoy, Sergey Zapechnikov:
Taxonomy for Unsecure Big Data Processing in Security Operations Centers. FiCloud Workshops 2016: 154-159 - 2015
- [c13]Sergey Zapechnikov, Natalia G. Miloslavskaya, Alexander I. Tolstoy:
Analysis of Hypoexponential Computing Services for Big Data Processing. FiCloud 2015: 579-584 - [c12]Natalia G. Miloslavskaya, Alexander I. Tolstoy:
Professional Competencies Level Assessment for Training of Masters in Information Security. World Conference on Information Security Education 2015: 135-145 - [c11]Sergey Zapechnikov, Alexander I. Tolstoy, Sergey Nagibin:
History of Cryptography in Syllabus on Information Security Training. World Conference on Information Security Education 2015: 146-157 - [c10]Natalia G. Miloslavskaya, Alexander I. Tolstoy, Vladislav Petrov:
Secure e-Learning portal for teaching business continuity and information security management. SIN 2015: 38-41 - [c9]Sergey Zapechnikov, Natalia G. Miloslavskaya, Alexander I. Tolstoy:
Modeling of next-generation firewalls as queueing services. SIN 2015: 250-257 - 2014
- [c8]Natalia G. Miloslavskaya, Vladislav Petrov, Alexander I. Tolstoy:
Security Aspects for e-Learning Portals. CSEDU (1) 2014: 427-432 - [c7]Natalia G. Miloslavskaya, Mikhail Senatorov, Alexander I. Tolstoy, Sergey Zapechnikov:
Information Security Maintenance Issues for Big Security-Related Data. FiCloud 2014: 361-366 - [c6]Natalia G. Miloslavskaya, Mikhail Senatorov, Alexander I. Tolstoy, Sergey Zapechnikov:
Big Data Information Security Maintenance. SIN 2014: 89 - 2013
- [c5]Natalia G. Miloslavskaya, Mikhail Senatorov, Alexander I. Tolstoy, Sergei Zapechnikov:
"Business Continuity and Information Security Maintenance" Masters' Training Program. World Conference on Information Security Education 2013: 95-102 - 2010
- [c4]Alexander I. Tolstoy, Natalia G. Miloslavskaya:
Bachelor of information security: ("automated systems security profile"). SIN 2010: 32-37
2000 – 2009
- 2009
- [c3]Natalia G. Miloslavskaya, Alexander I. Tolstoy:
Information Security Specialist Training on the Basis of ISO/IEC 27002. World Conference on Information Security Education 2009: 273-279 - [c2]Anna Kostina, Natalia G. Miloslavskaya, Alexander I. Tolstoy:
Information security incident management process. SIN 2009: 93-97 - 2007
- [c1]Andrey P. Kurilo, Natalia G. Miloslavskaya, Alexander I. Tolstoy:
Information Security Specialist Training for the Banking Sphere. World Conference on Information Security Education 2007: 87-93
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:02 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint