<?xml version="1.0"?>
<dblpperson name="Daria S. Lavrova" pid="168/1231" n="40">
<person key="homepages/168/1231" mdate="2016-01-28">
<author pid="168/1231">Daria S. Lavrova</author>
</person>
<r><article key="journals/accs/LavrovaB25" mdate="2026-03-05">
<author pid="168/1231">Daria S. Lavrova</author>
<author pid="428/6547">P. D. Bezborodov</author>
<title>Protection of Neural Network Models from Privacy Breach Threats in Federated Learning Using Optimization Methods.</title>
<year>2025</year>
<month>December</month>
<pages>1224-1229</pages>
<volume>59</volume>
<journal>Autom. Control. Comput. Sci.</journal>
<number>8</number>
<ee>https://doi.org/10.3103/S0146411625700749</ee>
<url>db/journals/accs/accs59.html#LavrovaB25</url>
<stream>streams/journals/accs</stream>
</article>
</r>
<r><article key="journals/accs/LavrovaZL25" mdate="2026-03-05">
<author pid="168/1231">Daria S. Lavrova</author>
<author pid="428/6606">A. A. Zyryanova</author>
<author pid="428/6726">A. A. Lyrchikov</author>
<title>Detecting the Spread of False News Content Using Machine Learning.</title>
<year>2025</year>
<month>December</month>
<pages>1345-1356</pages>
<volume>59</volume>
<journal>Autom. Control. Comput. Sci.</journal>
<number>8</number>
<ee>https://doi.org/10.3103/S0146411625700890</ee>
<url>db/journals/accs/accs59.html#LavrovaZL25</url>
<stream>streams/journals/accs</stream>
</article>
</r>
<r><article key="journals/accs/PakhomovPL25" mdate="2026-03-05">
<author pid="370/4009">M. A. Pakhomov</author>
<author pid="76/358">E. Yu. Pavlenko</author>
<author pid="168/1231">Daria S. Lavrova</author>
<title>Architecture of a Software System for Protecting Wireless Ad Hoc Networks from Active Network Attacks.</title>
<year>2025</year>
<month>December</month>
<pages>1512-1518</pages>
<volume>59</volume>
<journal>Autom. Control. Comput. Sci.</journal>
<number>8</number>
<ee>https://doi.org/10.3103/S0146411625701081</ee>
<url>db/journals/accs/accs59.html#PakhomovPL25</url>
<stream>streams/journals/accs</stream>
</article>
</r>
<r><article key="journals/accs/IzotovaL24" mdate="2025-04-07">
<author pid="314/9199">O. A. Izotova</author>
<author pid="168/1231">Daria S. Lavrova</author>
<title>Detecting Synthesized Audio Files Using Graph Neural Networks.</title>
<pages>1212-1217</pages>
<year>2024</year>
<month>December</month>
<volume>58</volume>
<journal>Autom. Control. Comput. Sci.</journal>
<number>8</number>
<ee>https://doi.org/10.3103/S0146411624700846</ee>
<url>db/journals/accs/accs58.html#IzotovaL24</url>
<stream>streams/journals/accs</stream>
</article>
</r>
<r><article key="journals/accs/AleksandrovaBL24" mdate="2025-04-07">
<author pid="174/4262">Elena B. Aleksandrova</author>
<author pid="401/5068">A. I. Bezborodko</author>
<author pid="168/1231">Daria S. Lavrova</author>
<title>The Use of Generative-Adversarial Networks to Counter Steganalysis.</title>
<pages>1283-1288</pages>
<year>2024</year>
<month>December</month>
<volume>58</volume>
<journal>Autom. Control. Comput. Sci.</journal>
<number>8</number>
<ee>https://doi.org/10.3103/S0146411624700937</ee>
<url>db/journals/accs/accs58.html#AleksandrovaBL24</url>
<stream>streams/journals/accs</stream>
</article>
</r>
<r><article key="journals/accs/GoretskiiL24" mdate="2025-04-07">
<author pid="401/4881">I. A. Goretskii</author>
<author pid="168/1231">Daria S. Lavrova</author>
<title>Intelligent Recommendation System for Countering Network Attacks.</title>
<pages>1386-1391</pages>
<year>2024</year>
<month>December</month>
<volume>58</volume>
<journal>Autom. Control. Comput. Sci.</journal>
<number>8</number>
<ee>https://doi.org/10.3103/S0146411624701050</ee>
<url>db/journals/accs/accs58.html#GoretskiiL24</url>
<stream>streams/journals/accs</stream>
</article>
</r>
<r><article key="journals/accs/LavrovaI23" mdate="2024-03-13">
<author pid="168/1231">Daria S. Lavrova</author>
<author pid="314/9199">O. A. Izotova</author>
<title>Early Detection of Network Attacks Based on Weight-Insensitive Neural Networks.</title>
<pages>1047-1054</pages>
<year>2023</year>
<month>December</month>
<volume>57</volume>
<journal>Autom. Control. Comput. Sci.</journal>
<number>8</number>
<ee>https://doi.org/10.3103/S014641162308014X</ee>
<url>db/journals/accs/accs57.html#LavrovaI23</url>
</article>
</r>
<r><article key="journals/accs/LavrovaBZP23" mdate="2024-03-13">
<author pid="168/1231">Daria S. Lavrova</author>
<author pid="370/3586">V. M. Bogina</author>
<author pid="35/3343">Dmitry P. Zegzhda</author>
<author pid="76/358">E. Yu. Pavlenko</author>
<title>Probabilistic Approach to Estimate the Cyber Resistance of Mobile Networks Based on Their Connectivity.</title>
<pages>1103-1115</pages>
<year>2023</year>
<month>December</month>
<volume>57</volume>
<journal>Autom. Control. Comput. Sci.</journal>
<number>8</number>
<ee>https://doi.org/10.3103/S0146411623080151</ee>
<url>db/journals/accs/accs57.html#LavrovaBZP23</url>
</article>
</r>
<r><article key="journals/virology/PavlenkoVLZ23" mdate="2023-08-31">
<author orcid="0000-0003-1345-1874" pid="76/358">Evgeniy Y. Pavlenko</author>
<author pid="286/1416">K. V. Vasil'eva</author>
<author pid="168/1231">Daria S. Lavrova</author>
<author pid="35/3343">Dmitry P. Zegzhda</author>
<title>Counteraction the cybersecurity threats of the in-vehicle local network.</title>
<pages>399-408</pages>
<year>2023</year>
<month>September</month>
<volume>19</volume>
<journal>J. Comput. Virol. Hacking Tech.</journal>
<number>3</number>
<ee>https://doi.org/10.1007/s11416-022-00451-0</ee>
<url>db/journals/virology/virology19.html#PavlenkoVLZ23</url>
</article>
</r>
<r><article key="journals/accs/SergadeevaLZ22" mdate="2023-03-08">
<author pid="341/8055">A. I. Sergadeeva</author>
<author pid="168/1231">Daria S. Lavrova</author>
<author pid="35/3343">Dmitry P. Zegzhda</author>
<title>Bank Fraud Detection with Graph Neural Networks.</title>
<pages>865-873</pages>
<year>2022</year>
<month>December</month>
<volume>56</volume>
<journal>Autom. Control. Comput. Sci.</journal>
<number>8</number>
<ee>https://doi.org/10.3103/S0146411622080223</ee>
<url>db/journals/accs/accs56.html#SergadeevaLZ22</url>
</article>
</r>
<r><article key="journals/accs/StepanovPL21" mdate="2022-03-04">
<author pid="286/1831">M. D. Stepanov</author>
<author pid="76/358">E. Yu. Pavlenko</author>
<author pid="168/1231">Daria S. Lavrova</author>
<title>Detecting Network Attacks on Software Configured Networks Using the Isolating Forest Algorithm.</title>
<pages>1039-1050</pages>
<year>2021</year>
<volume>55</volume>
<journal>Autom. Control. Comput. Sci.</journal>
<number>8</number>
<ee>https://doi.org/10.3103/S0146411621080307</ee>
<url>db/journals/accs/accs55.html#StepanovPL21</url>
</article>
</r>
<r><article key="journals/accs/VasilevaL21" mdate="2022-03-04">
<author pid="286/1416">K. V. Vasil'eva</author>
<author pid="168/1231">Daria S. Lavrova</author>
<title>Detecting Anomalies in Cyber-Physical Systems Using Graph Neural Networks.</title>
<pages>1051-1060</pages>
<year>2021</year>
<volume>55</volume>
<journal>Autom. Control. Comput. Sci.</journal>
<number>8</number>
<ee>https://doi.org/10.3103/S0146411621080320</ee>
<url>db/journals/accs/accs55.html#VasilevaL21</url>
</article>
</r>
<r><article key="journals/accs/IzotovaL21" mdate="2022-03-04">
<author pid="314/9199">O. A. Izotova</author>
<author pid="168/1231">Daria S. Lavrova</author>
<title>Fake Post Detection Using Graph Neural Networks.</title>
<pages>1215-1221</pages>
<year>2021</year>
<volume>55</volume>
<journal>Autom. Control. Comput. Sci.</journal>
<number>8</number>
<ee>https://doi.org/10.3103/S0146411621080393</ee>
<url>db/journals/accs/accs55.html#IzotovaL21</url>
</article>
</r>
<r><article key="journals/accs/ZaitsevaL20" mdate="2022-12-02">
<author pid="237/0693">Elizaveta Zaitseva</author>
<author pid="168/1231">Daria S. Lavrova</author>
<title>Self-Regulation of the Network Infrastructure of Cyberphysical Systems on the Basis of the Genome Assembly Problem.</title>
<pages>813-821</pages>
<year>2020</year>
<volume>54</volume>
<journal>Autom. Control. Comput. Sci.</journal>
<number>8</number>
<ee>https://doi.org/10.3103/S0146411620080350</ee>
<url>db/journals/accs/accs54.html#ZaitsevaL20</url>
</article>
</r>
<r><article key="journals/accs/LavrovaE20" mdate="2021-02-24">
<author pid="168/1231">Daria S. Lavrova</author>
<author pid="286/1154">N. N. Eliseev</author>
<title>Detection of Network Attacks Using the Tsetlin Machine.</title>
<pages>871-878</pages>
<year>2020</year>
<volume>54</volume>
<journal>Autom. Control. Comput. Sci.</journal>
<number>8</number>
<ee>https://doi.org/10.3103/S0146411620080209</ee>
<url>db/journals/accs/accs54.html#LavrovaE20</url>
</article>
</r>
<r><article key="journals/accs/LavrovaS20" mdate="2023-08-28">
<author pid="168/1231">Daria S. Lavrova</author>
<author pid="286/1651">R. S. Solovei</author>
<title>Ensuring the Information Security of Wireless Dynamic Networks Based on the Game-Theoretic Approach.</title>
<pages>937-943</pages>
<year>2020</year>
<volume>54</volume>
<journal>Autom. Control. Comput. Sci.</journal>
<number>8</number>
<ee>https://doi.org/10.3103/S0146411620080210</ee>
<ee>https://www.wikidata.org/entity/Q114945753</ee>
<url>db/journals/accs/accs54.html#LavrovaS20</url>
</article>
</r>
<r><article key="journals/accs/LavrovaS20a" mdate="2021-02-24">
<author pid="168/1231">Daria S. Lavrova</author>
<author pid="223/6660">Anna A. Shtyrkina</author>
<title>The Analysis of Artificial Neural Network Structure Recovery Possibilities Based on the Theory of Graphs.</title>
<pages>977-982</pages>
<year>2020</year>
<volume>54</volume>
<journal>Autom. Control. Comput. Sci.</journal>
<number>8</number>
<ee>https://doi.org/10.3103/S0146411620080222</ee>
<url>db/journals/accs/accs54.html#LavrovaS20a</url>
</article>
</r>
<r><article key="journals/symmetry/ZegzhdaLPS20" mdate="2020-12-29">
<author pid="35/3343">Dmitry P. Zegzhda</author>
<author pid="168/1231">Daria S. Lavrova</author>
<author orcid="0000-0003-1345-1874" pid="76/358">Evgeny Pavlenko</author>
<author pid="223/6660">Anna A. Shtyrkina</author>
<title>Cyber Attack Prevention Based on Evolutionary Cybernetics Approach.</title>
<pages>1931</pages>
<year>2020</year>
<volume>12</volume>
<journal>Symmetry</journal>
<number>11</number>
<ee type="oa">https://doi.org/10.3390/sym12111931</ee>
<url>db/journals/symmetry/symmetry12.html#ZegzhdaLPS20</url>
</article>
</r>
<r><article key="journals/accs/LavrovaZZ19" mdate="2020-11-25">
<author pid="168/1231">Daria S. Lavrova</author>
<author pid="237/0693">Elizaveta Zaitseva</author>
<author pid="35/3343">Dmitry P. Zegzhda</author>
<title>Approach to Presenting Network Infrastructure of Cyberphysical Systems to Minimize the Cyberattack Neutralization Time.</title>
<pages>387-392</pages>
<year>2019</year>
<volume>53</volume>
<journal>Autom. Control. Comput. Sci.</journal>
<number>5</number>
<ee>https://doi.org/10.3103/S0146411619050067</ee>
<url>db/journals/accs/accs53.html#LavrovaZZ19</url>
</article>
</r>
<r><article key="journals/accs/AleksandrovaLY19" mdate="2023-09-30">
<author orcid="0000-0002-7485-4848" pid="174/4262">Elena B. Aleksandrova</author>
<author pid="168/1231">Daria S. Lavrova</author>
<author orcid="0000-0002-7121-6031" pid="215/8247">A. V. Yarmak</author>
<title>Benford's Law in the Detection of DoS Attacks on Industrial Systems.</title>
<pages>954-962</pages>
<year>2019</year>
<volume>53</volume>
<journal>Autom. Control. Comput. Sci.</journal>
<number>8</number>
<ee>https://doi.org/10.3103/S0146411619080030</ee>
<url>db/journals/accs/accs53.html#AleksandrovaLY19</url>
</article>
</r>
<r><article key="journals/accs/Lavrova19" mdate="2020-05-11">
<author pid="168/1231">Daria S. Lavrova</author>
<title>Forecasting the State of Components of Smart Grids for Early Detection of Cyberattacks.</title>
<pages>1023-1025</pages>
<year>2019</year>
<volume>53</volume>
<journal>Autom. Control. Comput. Sci.</journal>
<number>8</number>
<ee>https://doi.org/10.3103/S0146411619080133</ee>
<url>db/journals/accs/accs53.html#Lavrova19</url>
</article>
</r>
<r><article key="journals/accs/Lavrova19a" mdate="2020-05-11">
<author pid="168/1231">Daria S. Lavrova</author>
<title>Maintaining Cyber Sustainability in Industrial Systems Based on the Concept of Molecular-Genetic Control Systems.</title>
<pages>1026-1028</pages>
<year>2019</year>
<volume>53</volume>
<journal>Autom. Control. Comput. Sci.</journal>
<number>8</number>
<ee>https://doi.org/10.3103/S0146411619080145</ee>
<url>db/journals/accs/accs53.html#Lavrova19a</url>
</article>
</r>
<r><article key="journals/accs/LavrovaPS19" mdate="2020-10-27">
<author pid="168/1231">Daria S. Lavrova</author>
<author pid="259/9435">E. A. Popova</author>
<author orcid="0000-0002-2141-6780" pid="223/6660">Anna A. Shtyrkina</author>
<title>Prevention of DoS Attacks by Predicting the Values of Correlation Network Traffic Parameters.</title>
<pages>1065-1071</pages>
<year>2019</year>
<volume>53</volume>
<journal>Autom. Control. Comput. Sci.</journal>
<number>8</number>
<ee>https://doi.org/10.3103/S0146411619080157</ee>
<url>db/journals/accs/accs53.html#LavrovaPS19</url>
</article>
</r>
<r><inproceedings key="conf/blackseecom/LavrovaZY19" mdate="2023-09-30">
<author pid="168/1231">Daria S. Lavrova</author>
<author pid="35/3343">Dmitry P. Zegzhda</author>
<author orcid="0000-0002-7121-6031" pid="215/8247">Anastasiia Yarmak</author>
<title>Using GRU neural network for cyber-attack detection in automated process control systems.</title>
<pages>1-3</pages>
<year>2019</year>
<booktitle>BlackSeaCom</booktitle>
<ee>https://doi.org/10.1109/BlackSeaCom.2019.8812818</ee>
<crossref>conf/blackseecom/2019</crossref>
<url>db/conf/blackseecom/blackseecom2019.html#LavrovaZY19</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icphys/ZegzhdaLK19" mdate="2019-08-07">
<author pid="35/3343">Dmitry P. Zegzhda</author>
<author pid="168/1231">Daria S. Lavrova</author>
<author pid="246/2830">Aleksei Khushkeev</author>
<title>Detection of information security breaches in distributed control systems based on values prediction of multidimensional time series.</title>
<pages>780-784</pages>
<year>2019</year>
<booktitle>ICPS</booktitle>
<ee>https://doi.org/10.1109/ICPHYS.2019.8780304</ee>
<crossref>conf/icphys/2019</crossref>
<url>db/conf/icphys/icps2019.html#ZegzhdaLK19</url>
</inproceedings>
</r>
<r><article key="journals/accs/KalininLY18" mdate="2025-01-19">
<author orcid="0000-0002-9732-0099" pid="60/2978">Maxim O. Kalinin</author>
<author pid="168/1231">Daria S. Lavrova</author>
<author orcid="0000-0002-7121-6031" pid="215/8247">A. V. Yarmak</author>
<title>Detection of Threats in Cyberphysical Systems Based on Deep Learning Methods Using Multidimensional Time Series.</title>
<pages>912-917</pages>
<year>2018</year>
<volume>52</volume>
<journal>Autom. Control. Comput. Sci.</journal>
<number>8</number>
<ee>https://doi.org/10.3103/S0146411618080151</ee>
<ee>https://www.wikidata.org/entity/Q128247525</ee>
<url>db/journals/accs/accs52.html#KalininLY18</url>
</article>
</r>
<r><article key="journals/accs/ZegzhdaPPLZ18" mdate="2023-08-28">
<author orcid="0000-0002-2048-6189" pid="68/1424">Peter D. Zegzhda</author>
<author pid="175/0127">Maria A. Poltavtseva</author>
<author pid="175/0036">Alexander I. Pechenkin</author>
<author pid="168/1231">Daria S. Lavrova</author>
<author pid="237/0693">Elizaveta Zaitseva</author>
<title>A Use Case Analysis of Heterogeneous Semistructured Objects in Information Security Problems.</title>
<pages>918-930</pages>
<year>2018</year>
<volume>52</volume>
<journal>Autom. Control. Comput. Sci.</journal>
<number>8</number>
<ee>https://doi.org/10.3103/S0146411618080278</ee>
<ee>https://www.wikidata.org/entity/Q114945799</ee>
<url>db/journals/accs/accs52.html#ZegzhdaPPLZ18</url>
</article>
</r>
<r><article key="journals/accs/LavrovaAS18" mdate="2023-08-28">
<author pid="168/1231">Daria S. Lavrova</author>
<author pid="215/8298">I. V. Alekseev</author>
<author orcid="0000-0002-2141-6780" pid="223/6660">Anna A. Shtyrkina</author>
<title>Security Analysis Based on Controlling Dependences of Network Traffic Parameters by Wavelet Transformation.</title>
<pages>931-935</pages>
<year>2018</year>
<volume>52</volume>
<journal>Autom. Control. Comput. Sci.</journal>
<number>8</number>
<ee>https://doi.org/10.3103/S0146411618080187</ee>
<ee>https://www.wikidata.org/entity/Q114945805</ee>
<url>db/journals/accs/accs52.html#LavrovaAS18</url>
</article>
</r>
<r><article key="journals/accs/ZegzhdaLS18" mdate="2025-01-19">
<author orcid="0000-0002-2048-6189" pid="68/1424">Peter D. Zegzhda</author>
<author pid="168/1231">Daria S. Lavrova</author>
<author orcid="0000-0002-2141-6780" pid="223/6660">Anna A. Shtyrkina</author>
<title>Multifractal Analysis of Internet Backbone Traffic for Detecting Denial of Service Attacks.</title>
<pages>936-944</pages>
<year>2018</year>
<volume>52</volume>
<journal>Autom. Control. Comput. Sci.</journal>
<number>8</number>
<ee>https://doi.org/10.3103/S014641161808028X</ee>
<ee>https://www.wikidata.org/entity/Q128258374</ee>
<url>db/journals/accs/accs52.html#ZegzhdaLS18</url>
</article>
</r>
<r><inproceedings key="conf/icphys/LavrovaPS18" mdate="2020-10-27">
<author pid="168/1231">Daria S. Lavrova</author>
<author pid="175/0127">Maria A. Poltavtseva</author>
<author orcid="0000-0002-2141-6780" pid="223/6660">Anna A. Shtyrkina</author>
<title>Security analysis of cyber-physical systems network infrastructure.</title>
<pages>818-823</pages>
<year>2018</year>
<booktitle>ICPS</booktitle>
<ee>https://doi.org/10.1109/ICPHYS.2018.8390812</ee>
<crossref>conf/icphys/2018</crossref>
<url>db/conf/icphys/icps2018.html#LavrovaPS18</url>
</inproceedings>
</r>
<r><article key="journals/accs/LavrovaV17" mdate="2023-08-28">
<author pid="168/1231">Daria S. Lavrova</author>
<author pid="215/8357">Yu. S. Vasil'ev</author>
<title>An ontological model of the domain of applications for the Internet of Things in analyzing information security.</title>
<pages>817-823</pages>
<year>2017</year>
<volume>51</volume>
<journal>Autom. Control. Comput. Sci.</journal>
<number>8</number>
<ee>https://doi.org/10.3103/S0146411617080132</ee>
<ee>https://www.wikidata.org/entity/Q114945847</ee>
<url>db/journals/accs/accs51.html#LavrovaV17</url>
</article>
</r>
<r><article key="journals/accs/ZegzhdaPL17" mdate="2023-08-28">
<author pid="35/3343">Dmitry P. Zegzhda</author>
<author pid="175/0127">Maria A. Poltavtseva</author>
<author pid="168/1231">Daria S. Lavrova</author>
<title>Systematization and security assessment of cyber-physical systems.</title>
<pages>835-843</pages>
<year>2017</year>
<volume>51</volume>
<journal>Autom. Control. Comput. Sci.</journal>
<number>8</number>
<ee>https://doi.org/10.3103/S0146411617080272</ee>
<ee>https://www.wikidata.org/entity/Q114945829</ee>
<url>db/journals/accs/accs51.html#ZegzhdaPL17</url>
</article>
</r>
<r><article key="journals/accs/Lavrova16" mdate="2020-05-11">
<author pid="168/1231">Daria S. Lavrova</author>
<title>An approach to developing the SIEM system for the Internet of Things.</title>
<pages>673-681</pages>
<year>2016</year>
<volume>50</volume>
<journal>Autom. Control. Comput. Sci.</journal>
<number>8</number>
<ee>https://doi.org/10.3103/S0146411616080125</ee>
<url>db/journals/accs/accs50.html#Lavrova16</url>
</article>
</r>
<r><article key="journals/accs/PoltavtsevaLP16" mdate="2020-05-11">
<author pid="175/0127">Maria A. Poltavtseva</author>
<author pid="168/1231">Daria S. Lavrova</author>
<author pid="175/0036">Alexander I. Pechenkin</author>
<title>Planning of aggregation and normalization of data from the Internet of Things for processing on a multiprocessor cluster.</title>
<pages>703-711</pages>
<year>2016</year>
<volume>50</volume>
<journal>Autom. Control. Comput. Sci.</journal>
<number>8</number>
<ee>https://doi.org/10.3103/S0146411616080162</ee>
<url>db/journals/accs/accs50.html#PoltavtsevaLP16</url>
</article>
</r>
<r><inproceedings key="conf/sin/ZegzhdaZKPML16" mdate="2021-10-14">
<author orcid="0000-0002-2048-6189" pid="68/1424">Peter D. Zegzhda</author>
<author pid="35/3343">Dmitry P. Zegzhda</author>
<author orcid="0000-0002-9732-0099" pid="60/2978">Maxim O. Kalinin</author>
<author pid="175/0036">Alexander I. Pechenkin</author>
<author pid="168/1128">Alexander Minin</author>
<author pid="168/1231">Daria S. Lavrova</author>
<title>Safe Integration of SIEM Systems with Internet of Things: Data Aggregation, Integrity Control, and Bioinspired Safe Routing.</title>
<pages>81-87</pages>
<year>2016</year>
<booktitle>SIN</booktitle>
<ee>https://doi.org/10.1145/2947626.2947639</ee>
<crossref>conf/sin/2016</crossref>
<url>db/conf/sin/sin2016.html#ZegzhdaZKPML16</url>
</inproceedings>
</r>
<r><article key="journals/accs/LavrovaP15" mdate="2020-05-11">
<author pid="168/1231">Daria S. Lavrova</author>
<author pid="175/0036">Alexander I. Pechenkin</author>
<title>Adaptive reflexivity threat protection.</title>
<pages>727-734</pages>
<year>2015</year>
<volume>49</volume>
<journal>Autom. Control. Comput. Sci.</journal>
<number>8</number>
<ee>https://doi.org/10.3103/S0146411615080106</ee>
<url>db/journals/accs/accs49.html#LavrovaP15</url>
</article>
</r>
<r><article key="journals/accs/LavrovaPG15" mdate="2020-05-11">
<author pid="168/1231">Daria S. Lavrova</author>
<author pid="175/0036">Alexander I. Pechenkin</author>
<author orcid="0000-0002-8228-3109" pid="149/2976">Vladimir V. Gluhov</author>
<title>Applying correlation analysis methods to control flow violation detection in the internet of things.</title>
<pages>735-740</pages>
<year>2015</year>
<volume>49</volume>
<journal>Autom. Control. Comput. Sci.</journal>
<number>8</number>
<ee>https://doi.org/10.3103/S0146411615080283</ee>
<url>db/journals/accs/accs49.html#LavrovaPG15</url>
</article>
</r>
<r><article key="journals/accs/PechenkinL15" mdate="2020-05-11">
<author pid="175/0036">Alexander I. Pechenkin</author>
<author pid="168/1231">Daria S. Lavrova</author>
<title>Modeling the search for vulnerabilities via the fuzzing method using an automation representation of network protocols.</title>
<pages>826-833</pages>
<year>2015</year>
<volume>49</volume>
<journal>Autom. Control. Comput. Sci.</journal>
<number>8</number>
<ee>https://doi.org/10.3103/S0146411615080325</ee>
<url>db/journals/accs/accs49.html#PechenkinL15</url>
</article>
</r>
<r><article key="journals/ijcnis/LavrovaP15" mdate="2021-02-16">
<author pid="168/1231">Daria S. Lavrova</author>
<author pid="175/0036">Alexander I. Pechenkin</author>
<title>Applying Correlation and Regression Analysis Methods for Security Incidents Detection in the Internet of Things.</title>
<year>2015</year>
<volume>7</volume>
<journal>Int. J. Commun. Networks Inf. Secur.</journal>
<number>3</number>
<ee type="oa">http://www.ijcnis.org/index.php/ijcnis/article/view/1375</ee>
<url>db/journals/ijcnis/ijcnis7.html#LavrovaP15</url>
</article>
</r>
<r><inproceedings key="conf/sin/StepanovaPL15" mdate="2018-11-06">
<author pid="44/9049">Tatiana V. Stepanova</author>
<author pid="175/0036">Alexander I. Pechenkin</author>
<author pid="168/1231">Daria S. Lavrova</author>
<title>Ontology-based big data approach to automated penetration testing of large-scale heterogeneous systems.</title>
<pages>142-149</pages>
<year>2015</year>
<booktitle>SIN</booktitle>
<ee>https://doi.org/10.1145/2799979.2799995</ee>
<crossref>conf/sin/2015</crossref>
<url>db/conf/sin/sin2015.html#StepanovaPL15</url>
</inproceedings>
</r>
<coauthors n="30" nc="2">
<co c="0"><na f="a/Aleksandrova:Elena_B=" pid="174/4262">Elena B. Aleksandrova</na></co>
<co c="0"><na f="a/Alekseev:I=_V=" pid="215/8298">I. V. Alekseev</na></co>
<co c="0"><na f="b/Bezborodko:A=_I=" pid="401/5068">A. I. Bezborodko</na></co>
<co c="-1"><na f="b/Bezborodov:P=_D=" pid="428/6547">P. D. Bezborodov</na></co>
<co c="0"><na f="b/Bogina:V=_M=" pid="370/3586">V. M. Bogina</na></co>
<co c="-1"><na f="e/Eliseev:N=_N=" pid="286/1154">N. N. Eliseev</na></co>
<co c="0" n="2"><na f="g/Glukhov:Vladimir_V=" pid="149/2976">Vladimir V. Glukhov</na><na>Vladimir V. Gluhov</na></co>
<co c="-1"><na f="g/Goretskii:I=_A=" pid="401/4881">I. A. Goretskii</na></co>
<co c="0"><na f="i/Izotova:O=_A=" pid="314/9199">O. A. Izotova</na></co>
<co c="0"><na f="k/Kalinin:Maxim_O=" pid="60/2978">Maxim O. Kalinin</na></co>
<co c="0"><na f="k/Khushkeev:Aleksei" pid="246/2830">Aleksei Khushkeev</na></co>
<co c="1"><na f="l/Lyrchikov:A=_A=" pid="428/6726">A. A. Lyrchikov</na></co>
<co c="0"><na f="m/Minin:Alexander" pid="168/1128">Alexander Minin</na></co>
<co c="0"><na f="p/Pakhomov:M=_A=" pid="370/4009">M. A. Pakhomov</na></co>
<co c="0" n="3"><na f="p/Pavlenko:Evgeny" pid="76/358">Evgeny Pavlenko</na><na>Evgeniy Y. Pavlenko</na><na>E. Yu. Pavlenko</na></co>
<co c="0"><na f="p/Pechenkin:Alexander_I=" pid="175/0036">Alexander I. Pechenkin</na></co>
<co c="0"><na f="p/Poltavtseva:Maria_A=" pid="175/0127">Maria A. Poltavtseva</na></co>
<co c="0"><na f="p/Popova:E=_A=" pid="259/9435">E. A. Popova</na></co>
<co c="0"><na f="s/Sergadeeva:A=_I=" pid="341/8055">A. I. Sergadeeva</na></co>
<co c="0"><na f="s/Shtyrkina:Anna_A=" pid="223/6660">Anna A. Shtyrkina</na></co>
<co c="-1"><na f="s/Solovei:R=_S=" pid="286/1651">R. S. Solovei</na></co>
<co c="0"><na f="s/Stepanov:M=_D=" pid="286/1831">M. D. Stepanov</na></co>
<co c="0"><na f="s/Stepanova:Tatiana_V=" pid="44/9049">Tatiana V. Stepanova</na></co>
<co c="0"><na f="v/Vasil=ev:Yu=_S=" pid="215/8357">Yu. S. Vasil'ev</na></co>
<co c="0"><na f="v/Vasil=eva:K=_V=" pid="286/1416">K. V. Vasil'eva</na></co>
<co c="0" n="2"><na f="y/Yarmak:A=_V=" pid="215/8247">A. V. Yarmak</na><na>Anastasiia Yarmak</na></co>
<co c="0"><na f="z/Zaitseva:Elizaveta" pid="237/0693">Elizaveta Zaitseva</na></co>
<co c="0"><na f="z/Zegzhda:Dmitry_P=" pid="35/3343">Dmitry P. Zegzhda</na></co>
<co c="0"><na f="z/Zegzhda:Peter_D=" pid="68/1424">Peter D. Zegzhda</na></co>
<co c="1"><na f="z/Zyryanova:A=_A=" pid="428/6606">A. A. Zyryanova</na></co>
</coauthors>
</dblpperson>

