default search action
Natalia G. Miloslavskaya
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [c64]Natalia G. Miloslavskaya, Svetlana Tolstaya:
Information Security Management Maturity Models. BICA*AI 2022: 49-57 - [c63]Natalia G. Miloslavskaya, Denis Stodelov, Mark Malakhov, Anna Marachyova:
Security Architecture of Network Security Centers as Part of Modern Intranets. BICA*AI 2022: 58-63 - [c62]Denis Stodelov, Natalia G. Miloslavskaya:
Open Source INTelligence Tools. BICA*AI 2022: 83-88 - [c61]Yuriy Chekhovskoy, Kirill Plaksiy, Andrey Nikiforov, Natalia G. Miloslavskaya:
The Use of Virtual Reality Technologies in the Specialists' Training in the Field of Information Security. BICA*AI 2022: 223-231 - [c60]Natalia G. Miloslavskaya, Alexander I. Tolstoy:
How to Overcome Staff Shortage in Professionals for SOCs and NSICs. World Conference on Information Security Education 2022: 31-45 - [c59]Natalia G. Miloslavskaya, Yakob Mesengiser:
Blockchain Redacting Algorithm with Storing Votes Inside the Chain. WorldCIST (1) 2022: 171-181 - [c58]Natalia G. Miloslavskaya, Svetlana Tolstaya:
Maturity Concept and Model Review. WorldCIST (1) 2022: 182-191 - [e4]Lynette Drevin, Natalia G. Miloslavskaya, Wai Sze Leung, Suné von Solms:
Information Security Education - Adapting to the Fourth Industrial Revolution - 15th IFIP WG 11.8 World Conference, WISE 2022, Copenhagen, Denmark, June 13-15, 2022, Proceedings. IFIP Advances in Information and Communication Technology 650, Springer 2022, ISBN 978-3-031-08171-2 [contents] - 2021
- [c57]Matt Bishop, Lynette Drevin, Lynn Futcher, Wai Sze Leung, Natalia G. Miloslavskaya, Erik L. Moore, Jacques Ophoff, Suné von Solms:
A Brief History and Overview of WISE. World Conference on Information Security Education 2021: 3-9 - [c56]Natalia G. Miloslavskaya, Alexander I. Tolstoy:
Formation of General Professional Competencies in Academic Training of Information Security Professionals. World Conference on Information Security Education 2021: 13-26 - [e3]Lynette Drevin, Natalia G. Miloslavskaya, Wai Sze Leung, Suné von Solms:
Information Security Education for Cyber Resilience - 14th IFIP WG 11.8 World Conference, WISE 2021, Virtual Event, June 22-24, 2021, Proceedings. IFIP Advances in Information and Communication Technology 615, Springer 2021, ISBN 978-3-030-80864-8 [contents] - 2020
- [j4]Natalia G. Miloslavskaya, Alexander I. Tolstoy:
IoTBlockSIEM for information security incident management in the internet of things ecosystem. Clust. Comput. 23(3): 1911-1925 (2020) - [c55]Yakob Mesengiser, Natalia G. Miloslavskaya:
Problems of Using Redactable Blockchain Technology. BICA*AI 2020: 582-589 - [c54]Natalia G. Miloslavskaya:
A Brief Evolution of Network Protection Tools and Methods. BICA*AI 2020: 590-596 - [c53]Natalia G. Miloslavskaya:
Network Protection Tools for Network Security Intelligence Centers. BICA*AI 2020: 597-603 - [c52]Andrey Vybornov, Natalia G. Miloslavskaya, Alexander I. Tolstoy:
Designing Competency Models for Cybersecurity Professionals for the Banking Sector. WISE 2020: 81-95 - [c51]Natalia G. Miloslavskaya, Svetlana Tolstaya:
On the Assessment of Compliance with the Requirements of Regulatory Documents to Ensure Information Security. WorldCIST (2) 2020: 789-795
2010 – 2019
- 2019
- [j3]Natalia G. Miloslavskaya, Alexander I. Tolstoy:
Internet of Things: information security challenges and solutions. Clust. Comput. 22(1): 103-119 (2019) - [c50]Alexander I. Tolstoy, Natalia G. Miloslavskaya:
Andragogy as a Scientific Basis for Training Professionals in Information Security. World Conference on Information Security Education 2019: 72-85 - [c49]Natalia G. Miloslavskaya, Alexander I. Tolstoy:
Blockchain and Its Security: Ignore or Insert into Academic Training? World Conference on Information Security Education 2019: 102-113 - [c48]Kirill Plaksiy, Andrey Nikiforov, Natalia G. Miloslavskaya:
Big Data Analytics for Financial Crime Typologies. Innovate-Data 2019: 165-178 - [c47]Natalia G. Miloslavskaya, Alexander I. Tolstoy:
New SIEM System for the Internet of Things. WorldCIST (2) 2019: 317-327 - [c46]Natalia G. Miloslavskaya, Andrey Nikiforov, Kirill Plaksiy, Alexander I. Tolstoy:
Standardization Issues for the Internet of Things. WorldCIST (2) 2019: 328-338 - 2018
- [j2]Natalia G. Miloslavskaya:
Designing blockchain-based SIEM 3.0 system. Inf. Comput. Secur. 26(4): 491-512 (2018) - [j1]Natalia G. Miloslavskaya:
Information security management in SOCs and SICs. J. Intell. Fuzzy Syst. 35(3): 2637-2647 (2018) - [c45]Natalia G. Miloslavskaya:
Network Security Intelligence Center as a combination of SIC and NOC. BICA 2018: 354-358 - [c44]Natalia G. Miloslavskaya:
Developing a Network Security Intelligence Center. BICA 2018: 359-364 - [c43]Natalia G. Miloslavskaya, Andrey Nikiforov, Vladimir Budzko:
Standardization of Ensuring Information Security for Big Data Technologies. FiCloud Workshops 2018: 56-63 - [c42]Kirill Plaksiy, Andrey Nikiforov, Natalia G. Miloslavskaya:
Applying Big Data Technologies to Detect Cases of Money Laundering and Counter Financing of Terrorism. FiCloud Workshops 2018: 70-77 - [c41]Natalia G. Miloslavskaya, Alexander I. Tolstoy:
Developing Hands-On Laboratory Works for the "Information Security Incident Management" Discipline. World Conference on Information Security Education 2018: 28-39 - [c40]Vladimir Budzko, Natalia G. Miloslavskaya, Alexander I. Tolstoy:
Forming the Abilities of Designing Information Security Maintenance Systems in the Implementation of Educational Programmes in Information Security. World Conference on Information Security Education 2018: 108-120 - 2017
- [c39]Natalia G. Miloslavskaya:
Remote Attacks Taxonomy and their Verbal Indicators. BICA 2017: 278-284 - [c38]Natalia G. Miloslavskaya:
Security Intelligence Centers for Big Data Processing. FiCloud Workshops 2017: 7-13 - [c37]Natalia G. Miloslavskaya, Alexander I. Tolstoy:
Ensuring Information Security for Internet of Things. FiCloud 2017: 62-69 - [c36]Anton Zaytsev, Anatoly Malyuk, Natalia G. Miloslavskaya:
Critical Analysis in the Research Area of Insider Threats. FiCloud 2017: 288-296 - [c35]Natalia G. Miloslavskaya, Victor Morozov, Alexander I. Tolstoy, Dennis Khassan:
DLP as an Integral Part of Network Security Intelligence Center. FiCloud 2017: 297-304 - [c34]Natalia G. Miloslavskaya, Alexander I. Tolstoy:
Designing Degree Programmes for Bachelors and Masters in Information Security. World Conference on Information Security Education 2017: 14-26 - [c33]Natalia G. Miloslavskaya, Alexander I. Tolstoy:
ISO/IEC Competence Requirements for Information Security Professionals. World Conference on Information Security Education 2017: 135-146 - [c32]Natalia G. Miloslavskaya, Alexander I. Tolstoy, Anton Migalin:
"Network Security Intelligence" Educational and Research Center. World Conference on Information Security Education 2017: 157-168 - [c31]Natalia G. Miloslavskaya:
SOC- and SIC-Based Information Security Monitoring. WorldCIST (2) 2017: 364-374 - [c30]Anton Zaytsev, Anatoly Malyuk, Natalia G. Miloslavskaya:
Analysis of Research on Specific Insider Information Security Threats. WorldCIST (2) 2017: 725-735 - [e2]Matt Bishop, Lynn Futcher, Natalia G. Miloslavskaya, Marianthi Theocharidou:
Information Security Education for a Global Digital Society - 10th IFIP WG 11.8 World Conference, WISE 10, Rome, Italy, May 29-31, 2017, Proceedings. IFIP Advances in Information and Communication Technology 503, Springer 2017, ISBN 978-3-319-58552-9 [contents] - 2016
- [c29]Sergey Zapechnikov, Natalia G. Miloslavskaya, Alexander I. Tolstoy:
Analysis of Intrusion Detection and Prevention Systems as Queueing Services. AINA Workshops 2016: 855-860 - [c28]Anatoly Malyuk, Natalia G. Miloslavskaya:
Information Security and Expert's Knowledge Autoformalization. BICA 2016: 288-293 - [c27]Natalia G. Miloslavskaya, Alexander I. Tolstoy:
Big Data, Fast Data and Data Lake Concepts. BICA 2016: 300-305 - [c26]Dmitriy A. Melnikov, Vladislav Petrov, Natalia G. Miloslavskaya, Anatoliy P. Durakovskiy, Tatiana Kondratyeva:
Cybertrust in e-Learning Environment based on Network Time Synchronization. CSEDU (2) 2016: 402-407 - [c25]Natalia G. Miloslavskaya, Alexander I. Tolstoy:
State-Level Views on Professional Competencies in the Field of IoT and Cloud Information Security. FiCloud Workshops 2016: 83-90 - [c24]Natalia G. Miloslavskaya:
Security Operations Centers for Information Security Incident Management. FiCloud 2016: 131-136 - [c23]Natalia G. Miloslavskaya, Aida Makhmudova:
Survey of Big Data Information Security. FiCloud Workshops 2016: 133-138 - [c22]Natalia G. Miloslavskaya, Alexander I. Tolstoy:
Application of Big Data, Fast Data, and Data Lake Concepts to Information Security Issues. FiCloud Workshops 2016: 148-153 - [c21]Natalia G. Miloslavskaya, Alexander I. Tolstoy, Sergey Zapechnikov:
Taxonomy for Unsecure Big Data Processing in Security Operations Centers. FiCloud Workshops 2016: 154-159 - 2015
- [c20]Vladislav Petrov, Natalia G. Miloslavskaya, Victor Gorbatov, Anatoliy P. Durakovskiy:
Problem of Trust in e-Learning Environment. CSEDU (1) 2015: 424-429 - [c19]Anatoly Malyuk, Natalia G. Miloslavskaya:
Information Security Theory for the Future Internet. FiCloud 2015: 150-157 - [c18]Sergey A. Stupnikov, Natalia G. Miloslavskaya, Vladimir Budzko:
Unification of Graph Data Models for Heterogeneous Security Information Resources' Integration. FiCloud 2015: 457-464 - [c17]Sergey Zapechnikov, Natalia G. Miloslavskaya, Alexander I. Tolstoy:
Analysis of Hypoexponential Computing Services for Big Data Processing. FiCloud 2015: 579-584 - [c16]Sergey Zapechnikov, Natalia G. Miloslavskaya, Vladimir Budzko:
On Experience of Using Distance Learning Technologies for Teaching Cryptology. World Conference on Information Security Education 2015: 111-121 - [c15]Natalia G. Miloslavskaya, Alexander I. Tolstoy:
Professional Competencies Level Assessment for Training of Masters in Information Security. World Conference on Information Security Education 2015: 135-145 - [c14]Natalia G. Miloslavskaya, Alexander I. Tolstoy, Vladislav Petrov:
Secure e-Learning portal for teaching business continuity and information security management. SIN 2015: 38-41 - [c13]Sergey Zapechnikov, Natalia G. Miloslavskaya, Alexander I. Tolstoy:
Modeling of next-generation firewalls as queueing services. SIN 2015: 250-257 - [e1]Matt Bishop, Natalia G. Miloslavskaya, Marianthi Theocharidou:
Information Security Education Across the Curriculum - 9th IFIP WG 11.8 World Conference, WISE9, Hamburg, Germany, May 26-28, 2015, Proceedings. IFIP Advances in Information and Communication Technology 453, Springer 2015, ISBN 978-3-319-18499-9 [contents] - 2014
- [c12]Dmitry Chernyavskiy, Natalia G. Miloslavskaya:
An Approach to Information Security Policy Modeling for Enterprise Networks. Communications and Multimedia Security 2014: 118-127 - [c11]Natalia G. Miloslavskaya, Vladislav Petrov, Alexander I. Tolstoy:
Security Aspects for e-Learning Portals. CSEDU (1) 2014: 427-432 - [c10]Natalia G. Miloslavskaya, Mikhail Senatorov, Alexander I. Tolstoy, Sergey Zapechnikov:
Information Security Maintenance Issues for Big Security-Related Data. FiCloud 2014: 361-366 - [c9]Anatoly Malyuk, Natalia G. Miloslavskaya:
Information Security Theory Development. SIN 2014: 52 - [c8]Natalia G. Miloslavskaya, Mikhail Senatorov, Alexander I. Tolstoy, Sergey Zapechnikov:
Big Data Information Security Maintenance. SIN 2014: 89 - 2013
- [c7]Natalia G. Miloslavskaya, Mikhail Senatorov, Alexander I. Tolstoy, Sergei Zapechnikov:
"Business Continuity and Information Security Maintenance" Masters' Training Program. World Conference on Information Security Education 2013: 95-102 - 2012
- [c6]Dmitry Chernyavskiy, Natalia G. Miloslavskaya:
A concept of unification of network security policies. SIN 2012: 27-32 - 2010
- [c5]Alexander I. Tolstoy, Natalia G. Miloslavskaya:
Bachelor of information security: ("automated systems security profile"). SIN 2010: 32-37
2000 – 2009
- 2009
- [c4]Natalia G. Miloslavskaya, Alexander I. Tolstoy:
Information Security Specialist Training on the Basis of ISO/IEC 27002. World Conference on Information Security Education 2009: 273-279 - [c3]Andrey P. Kurilo, Natalia G. Miloslavskaya, Svetlana Tolstaya:
Ensuring information security controls for the Russian banking organizations. SIN 2009: 56-60 - [c2]Anna Kostina, Natalia G. Miloslavskaya, Alexander I. Tolstoy:
Information security incident management process. SIN 2009: 93-97 - 2007
- [c1]Andrey P. Kurilo, Natalia G. Miloslavskaya, Alexander I. Tolstoy:
Information Security Specialist Training for the Banking Sphere. World Conference on Information Security Education 2007: 87-93
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:48 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint