Follow
Konstantin Izrailov
Konstantin Izrailov
Saint Petersburg State University of Telecommunications
Verified email at spbgut.ru - Homepage
Title
Cited by
Cited by
Year
Method and utility for recovering code algorithms of telecommunication devices for vulnerability search
M Buinevich, K Izrailov
16th International conference on advanced communication technology, 172-176, 2014
462014
Static analysis of information systems for IoT cyber security: A survey of machine learning approaches
I Kotenko, K Izrailov, M Buinevich
Sensors 22 (4), 1335, 2022
392022
The life cycle of vulnerabilities in the representations of software for telecommunication devices
M Buinevich, K Izrailov, A Vladyko
2016 18th International Conference on Advanced Communication Technology …, 2016
392016
Method and prototype of utility for partial recovering source code for low-level and medium-level vulnerability search
M Buinevich, K Izrailov, A Vladyko
2016 18th International Conference on Advanced Communication Technology …, 2016
272016
Metric of vulnerability at the base of the life cycle of software representations
M Buinevich, K Izrailov, A Vladyko
2018 20th International Conference on Advanced Communication Technology …, 2018
262018
Testing of utilities for finding vulnerabilities in the machine code of telecommunication devices
M Buinevich, K Izrailov, A Vladyko
2017 19th International Conference on Advanced Communication Technology …, 2017
252017
Method for partial recovering source code of telecommunication devices for vulnerability search
M Buinevich, K Izrailov, A Vladyko
2015 17th International Conference on Advanced Communication Technology …, 2015
252015
Software defined internet of things: cyber antifragility and vulnerability forecast
M Buinevich, P Fabrikantov, E Stolyarova, K Izrailov, A Vladyko
2017 IEEE 11th international conference on application of information and …, 2017
222017
Digital cloud environment: present challenges and future forecast
S Mescheryakov, D Shchemelinin, K Izrailov, V Pokussov
Future Internet 12 (5), 82, 2020
152020
Combine method of forecasting VANET cybersecurity for application of high priority way
M Buinevich, K Izrailov, E Stolyarova, A Vladyko
2018 20th International Conference on Advanced Communication Technology …, 2018
142018
An approach for stego-insider detection based on a hybrid nosql database
I Kotenko, A Krasov, I Ushakov, K Izrailov
Journal of Sensor and Actuator Networks 10 (2), 25, 2021
132021
Method and algorithms of visual audit of program interaction.
MV Buinevich, KE Izrailov, IV Kotenko, PA Kurta
J. Internet Serv. Inf. Secur. 11 (1), 16-43, 2021
122021
Generalized interaction model in the information system
MV Buinevich, KE Izrailov, VV Pokusov, SV Sharapov, SN Terekhin
International Journal of Pure and Applied Mathematics 119 (17), 1381-1385, 2018
122018
Threats classification method for the transport infrastructure of a smart city
K Izrailov, A Chechulin, L Vitkova
2020 IEEE 14th International Conference on Application of Information and …, 2020
102020
Analytical modeling for identification of the machine code architecture of cyberphysical devices in smart homes
I Kotenko, K Izrailov, M Buinevich
Sensors 22 (3), 1017, 2022
72022
Detection of stego-insiders in corporate networks based on a hybrid NoSQL database model
I Kotenko, A Krasov, I Ushakov, K Izrailov
Proceedings of the 4th International Conference on Future Networks and …, 2020
72020
Modeling the Development of Energy Network Software, Taking into Account the Detection and Elimination of Vulnerabilities
I Kotenko, K Izrailov, M Buinevich, I Saenko, R Shorey
Energies 16 (13), 5111, 2023
62023
Identification of processor’s architecture of executable code based on machine learning. part 1. frequency byte model
M Buinevich, K Izrailov
Proc. Telecommun. Univ 6, 77-85, 2020
62020
Algorithmization Machine Code of Telecommunication Devices As a Strategic Means of Ensuring the Information Security
K Izrailov
Natsional'naya bezopasnost'i strategicheskoe planirovanie, 2, 2013
62013
Classification and analysis of vulnerabilities in mobile device infrastructure interfaces
K Izrailov, D Levshun, I Kotenko, A Chechulin
International Symposium on Mobile Internet Security, 301-319, 2021
52021
The system can't perform the operation now. Try again later.
Articles 1–20