default search action
Maxim O. Kalinin
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2023
- [j34]Maxim O. Kalinin, A. F. Suprun, O. D. Ivanova:
Hybrid Method for the Detection of Evasion Attacks Aimed at Machine Learning Systems. Autom. Control. Comput. Sci. 57(8): 983-988 (2023) - [j33]Maxim O. Kalinin, M. D. Soshnev, Artem S. Konoplev:
Protection of Computational Machine Learning Models against Extraction Threat. Autom. Control. Comput. Sci. 57(8): 996-1004 (2023) - [j32]Maxim O. Kalinin, E. I. Tkacheva:
A Decentralized Approach to Intrusion Detection in Dynamic Networks of the Internet of Things Based on Multiagent Reinforcement Learning with Interagent Interaction. Autom. Control. Comput. Sci. 57(8): 1025-1032 (2023) - [j31]Vasiliy M. Krundyshev, Georgi A. Markov, Maxim O. Kalinin, P. V. Sem'yanov, Alexey G. Busygin:
Cyberattack Detection in the Industrial Internet of Things Based on the Computation Model of Hierarchical Temporal Memory. Autom. Control. Comput. Sci. 57(8): 1040-1046 (2023) - [j30]Maxim O. Kalinin, Evgenii Zavadskii, Alexey G. Busygin:
A Graph-Based Technique for Securing the Distributed Cyber-Physical System Infrastructure. Sensors 23(21): 8724 (2023) - [j29]Maxim O. Kalinin, Vasiliy M. Krundyshev:
Security intrusion detection using quantum machine learning techniques. J. Comput. Virol. Hacking Tech. 19(1): 125-136 (2023) - 2022
- [j28]Vasiliy M. Krundyshev, Maxim O. Kalinin:
Mathematical Model of the Spread of Computer Attacks on Critical Information Infrastructure. Autom. Control. Comput. Sci. 56(8): 927-933 (2022) - [j27]Vasiliy M. Krundyshev, Maxim O. Kalinin:
Adaptive Control System for Detecting Computer Attacks on Objects of Critical Information Infrastructure. Autom. Control. Comput. Sci. 56(8): 1040-1048 (2022) - [j26]Maxim O. Kalinin, Tigran Ovasapyan, Maria A. Poltavtseva:
Application of the Learning Automaton Model for Ensuring Cyber Resiliency. Symmetry 14(10): 2208 (2022) - 2021
- [j25]Maxim O. Kalinin:
Application of Neuro-Fuzzy Inference to Detect Network Scanning. Autom. Control. Comput. Sci. 55(8): 908-917 (2021) - [j24]Maxim O. Kalinin, Vasiliy M. Krundyshev:
Analysis of a Huge Amount of Network Traffic Based on Quantum Machine Learning. Autom. Control. Comput. Sci. 55(8): 1165-1174 (2021) - 2020
- [j23]Maxim O. Kalinin, Vasiliy M. Krundyshev, B. G. Sinyapkin:
Development of the Intrusion Detection System for the Internet of Things Based on a Sequence Alignment Algorithm. Autom. Control. Comput. Sci. 54(8): 993-1000 (2020) - 2019
- [j22]Elena B. Aleksandrova, A. V. Yarmak, Maxim O. Kalinin:
Analysis of Approaches to Group Authentication in Large-Scale Industrial Systems. Autom. Control. Comput. Sci. 53(8): 879-882 (2019) - [j21]Maria A. Poltavtseva, Maxim O. Kalinin:
Modeling Big Data Management Systems in Information Security. Autom. Control. Comput. Sci. 53(8): 895-902 (2019) - [j20]Maria A. Poltavtseva, Dmitry P. Zegzhda, Maxim O. Kalinin:
Big Data Management System Security Threat Model. Autom. Control. Comput. Sci. 53(8): 903-913 (2019) - [j19]Elena B. Aleksandrova, E. N. Shkorkina, Maxim O. Kalinin:
Organization of the Quantum Cryptographic Keys Distribution System for Transportation Infrastructure Users. Autom. Control. Comput. Sci. 53(8): 969-971 (2019) - [j18]Dmitry P. Zegzhda, Maxim O. Kalinin, M. V. Levykin:
Actual Vulnerabilities of Industrial Automation Protocols of an Open Platform Communications Series. Autom. Control. Comput. Sci. 53(8): 972-979 (2019) - 2018
- [j17]Maxim O. Kalinin, Vasiliy M. Krundyshev, Evgenia Rezedinova, D. V. Reshetov:
Hierarchical Software-Defined Security Management for Large-Scale Dynamic Networks. Autom. Control. Comput. Sci. 52(8): 906-911 (2018) - [j16]Maxim O. Kalinin, Daria S. Lavrova, A. V. Yarmak:
Detection of Threats in Cyberphysical Systems Based on Deep Learning Methods Using Multidimensional Time Series. Autom. Control. Comput. Sci. 52(8): 912-917 (2018) - [j15]T. D. Ovasapyan, Dmitry A. Moskvin, Maxim O. Kalinin:
Using Neural Networks to Detect Internal Intruders in VANETs. Autom. Control. Comput. Sci. 52(8): 954-958 (2018) - [j14]Roman Demidov, Alexander I. Pechenkin, Peter D. Zegzhda, Maxim O. Kalinin:
Application Model of Modern Artificial Neural Network Methods for the Analysis of Information Systems Security. Autom. Control. Comput. Sci. 52(8): 965-970 (2018) - [j13]Roman Demidov, Peter D. Zegzhda, Maxim O. Kalinin:
Threat Analysis of Cyber Security in Wireless Adhoc Networks Using Hybrid Neural Network Model. Autom. Control. Comput. Sci. 52(8): 971-976 (2018) - [j12]Maxim O. Kalinin, E. A. Zubkov, A. F. Suprun, Alexander I. Pechenkin:
Prevention of Attacks on Dynamic Routing in Self-Organizing Adhoc Networks Using Swarm Intelligence. Autom. Control. Comput. Sci. 52(8): 977-983 (2018) - 2017
- [j11]Maxim O. Kalinin, Alexander Minin:
Security evaluation of a wireless ad-hoc network with dynamic topology. Autom. Control. Comput. Sci. 51(8): 899-901 (2017) - [j10]Maxim O. Kalinin, Vasiliy M. Krundyshev, P. V. Semianov:
Architectures for building secure vehicular networks based on SDN technology. Autom. Control. Comput. Sci. 51(8): 907-914 (2017) - 2016
- [j9]Artem S. Konoplev, Maxim O. Kalinin:
Access control system for distributed computing networks. Autom. Control. Comput. Sci. 50(8): 664-668 (2016) - [j8]Artem S. Konoplev, Maxim O. Kalinin:
Tasks of providing information security in distributed computing networks. Autom. Control. Comput. Sci. 50(8): 669-672 (2016) - [j7]Peter D. Zegzhda, Maxim O. Kalinin:
Technology of security services virtualization for high-speed computer networks. Autom. Control. Comput. Sci. 50(8): 734-738 (2016) - [j6]Alexey G. Busygin, Artem S. Konoplev, Maxim O. Kalinin:
Approaches to protection of applications based on the TLS protocol against attacks using revoked certificates. Autom. Control. Comput. Sci. 50(8): 743-748 (2016) - 2015
- [j5]Peter D. Zegzhda, Maxim O. Kalinin:
Automatic security management of computer systems. Autom. Control. Comput. Sci. 49(8): 665-672 (2015) - [j4]Maxim O. Kalinin, Evgeny Pavlenko:
Increasing the fault tolerance and availability of software defined networks using network equipment control based on multiobjective optimization by service quality parameters. Autom. Control. Comput. Sci. 49(8): 673-678 (2015) - [j3]Artem S. Konoplev, Maxim O. Kalinin:
Access control method in distributed grid computing networks. Autom. Control. Comput. Sci. 49(8): 679-683 (2015) - [j2]N. S. Vert, A. S. Volkova, Dmitry P. Zegzhda, Maxim O. Kalinin:
Maintenance of sustainable operation of pipeline-parallel computing systems in the cloud environment. Autom. Control. Comput. Sci. 49(8): 713-720 (2015) - 2006
- [j1]Il-Gon Kim, Miyoung Kang, Jin-Young Choi, Peter D. Zegzhda, Maxim O. Kalinin, Dmitry P. Zegzhda, Inhye Kang:
Formal Verification of Security Model Using SPR Tool. Comput. Artif. Intell. 25(5): 353-368 (2006)
Conference and Workshop Papers
- 2020
- [c26]Haejin Cho, Sangwon Lim, Viacheslav Belenko, Maxim O. Kalinin, Dmitry P. Zegzhda, Ellada Nuralieva:
Application and improvement of sequence alignment algorithms for intrusion detection in the Internet of Things. ICPS 2020: 93-97 - [c25]Maxim O. Kalinin, Peter D. Zegzhda:
AI-based Security for the Smart Networks. SIN 2020: 22:1-22:4 - 2019
- [c24]Vasiliy M. Krundyshev, Maxim O. Kalinin:
Prevention of false data injections in smart infrastructures. BlackSeaCom 2019: 1-5 - [c23]Maria A. Poltavtseva, Maxim O. Kalinin:
Conceptual Data Modeling Using Aggregates to Ensure Large-Scale Distributed Data Management Systems Security. IDC 2019: 41-47 - [c22]Vasiliy M. Krundyshev, Maxim O. Kalinin:
Hybrid neural network framework for detection of cyber attacks at smart infrastructures. SIN 2019: 9:1-9:7 - 2018
- [c21]Maxim O. Kalinin, Vasiliy M. Krundyshev, Evgenia Rezedinova, Peter D. Zegzhda:
Role-Based Access Control for Vehicular Adhoc Networks. BlackSeaCom 2018: 1-5 - [c20]Vasiliy M. Krundyshev, Maxim O. Kalinin, Peter D. Zegzhda:
Artificial swarm algorithm for VANET protection against routing attacks. ICPS 2018: 795-800 - [c19]Viacheslav Belenko, Vasiliy M. Krundyshev, Maxim O. Kalinin:
Synthetic datasets generation for intrusion detection in VANET. SIN 2018: 9:1-9:6 - [c18]Alexey G. Busygin, Artem S. Konoplev, Maxim O. Kalinin, Dmitry P. Zegzhda:
Floating Genesis Block Enhancement for Blockchain Based Routing Between Connected Vehicles and Software-defined VANET Security Services. SIN 2018: 24:1-24:2 - 2017
- [c17]Maxim O. Kalinin, Vasiliy M. Krundyshev, Peter D. Zegzhda, Viacheslav Belenko:
Network security architectures for VANET. SIN 2017: 73-79 - 2016
- [c16]Maxim O. Kalinin, Peter D. Zegzhda, Dmitry P. Zegzhda, Yuri Vasiliev, Viacheslav Belenko:
Software defined security for vehicular ad hoc networks. ICTC 2016: 533-537 - [c15]Peter D. Zegzhda, Dmitry P. Zegzhda, Maxim O. Kalinin, Alexander I. Pechenkin, Alexander Minin, Daria S. Lavrova:
Safe Integration of SIEM Systems with Internet of Things: Data Aggregation, Integrity Control, and Bioinspired Safe Routing. SIN 2016: 81-87 - 2015
- [c14]Alexander Minin, Maxim O. Kalinin:
Information security in computer networks with dynamic topology. SIN 2015: 127-130 - 2013
- [c13]Artem S. Konoplev, Maxim O. Kalinin:
Security policy verification in grid systems. SIN 2013: 356-358 - 2012
- [c12]Peter D. Zegzhda, Dmitry P. Zegzhda, Maxim O. Kalinin, Artem S. Konoplev:
Security Modeling of Grid Systems Using Petri Nets. MMM-ACNS 2012: 299-308 - 2010
- [c11]Yaroslav A. Markov, Maxim O. Kalinin:
Intellectual Intrusion Detection with Sequences Alignment Methods. MMM-ACNS 2010: 217-228 - [c10]Dmitry P. Zegzhda, Peter D. Zegzhda, Maxim O. Kalinin:
Clarifying Integrity Control at the Trusted Information Environment. MMM-ACNS 2010: 337-344 - [c9]Tatiana V. Stepanova, Maxim O. Kalinin, Peter Baranov, Dmitry P. Zegzhda:
Homogeneity analysis of power consumption for information security purposes. SIN 2010: 113-117 - [c8]Maxim O. Kalinin:
Permanent protection of information systems with method of automated security and integrity control. SIN 2010: 118-123 - 2008
- [c7]Dmitry P. Zegzhda, Maxim O. Kalinin, Alexander Vovk:
"Linux over OSMOS": the Secure Hybrid Operating System. Enterprise Information Systems and Web Technologies 2008: 47-54 - [c6]Dmitry P. Zegzhda, Maxim O. Kalinin, Olga Savelyeva:
The Use of Conference Control to Design a Protected Videoconference System. Enterprise Information Systems and Web Technologies 2008: 55-60 - [c5]Dmitry P. Zegzhda, Maxim O. Kalinin:
Security Assurance for the Attribute-Based Access Control Systems. Enterprise Information Systems and Web Technologies 2008: 147-154 - 2007
- [c4]Dmitry P. Zegzhda, Maxim O. Kalinin:
Logical Security Evaluation of Real-World Operating Systems. Enterprise Information Systems and Web Technologies 2007: 234-241 - 2005
- [c3]Peter D. Zegzhda, Dmitry P. Zegzhda, Maxim O. Kalinin:
Vulnerabilities Detection in the Configurations of MS Windows Operating System. MMM-ACNS 2005: 339-351 - [c2]Peter D. Zegzhda, Dmitry P. Zegzhda, Maxim O. Kalinin:
Detection of the Operating System Configuration Vulnerabilities with Safety Evaluation Facility. WOSIS 2005: 263-276 - 2003
- [c1]Peter D. Zegzhda, Dmitry P. Zegzhda, Maxim O. Kalinin:
Logical Resolving for Security Evaluation. MMM-ACNS 2003: 147-156
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:57 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint