Covert channel limitation via special dummy traffic generating
Epishkina, Anna, Karapetyants, Nikolay, Kogos, Konstantin, Lebedev, Philip
Published in Journal of Computer Virology and Hacking Techniques (01.09.2023)
Published in Journal of Computer Virology and Hacking Techniques (01.09.2023)
Get full text
Journal Article
A concept of continuous user authentication based on behavioral biometrics
Eremin, Aleksandr, Kogos, Konstantin, Filina, Alina
Published in 2017 20th Conference of Open Innovations Association (FRUCT) (01.04.2017)
Published in 2017 20th Conference of Open Innovations Association (FRUCT) (01.04.2017)
Get full text
Conference Proceeding
Journal Article
Prospective approaches to detecting network covert channels
Kogos, Konstantin G., Finoshin, Mihail A.
Published in Bezopasnostʹ informat͡s︡ionnykh tekhnologiĭ (01.04.2021)
Published in Bezopasnostʹ informat͡s︡ionnykh tekhnologiĭ (01.04.2021)
Get full text
Journal Article
Method for identifying network covert channels
Kogos, Konstantin G., Finoshin, Mihail A., Airapetyan, Sergey V.
Published in Bezopasnostʹ informat͡s︡ionnykh tekhnologiĭ (01.09.2021)
Published in Bezopasnostʹ informat͡s︡ionnykh tekhnologiĭ (01.09.2021)
Get full text
Journal Article
Module for Collecting, Processing and Aggregating Data of the Transaction Analysis System on the Bitcoin Network
Basinya, Evgeny A., Karapetyants, Nikolay, Karapetyants, Mark, Kogos, Konstantin G.
Published in 2023 IEEE XVI International Scientific and Technical Conference Actual Problems of Electronic Instrument Engineering (APEIE) (10.11.2023)
Published in 2023 IEEE XVI International Scientific and Technical Conference Actual Problems of Electronic Instrument Engineering (APEIE) (10.11.2023)
Get full text
Conference Proceeding
New Approach in the Rainbow Tables Method for Human-Like Passwords
Alpatskiy, Mark A., Borzunov, Georgii I., Epishkina, Anna V., Kogos, Konstantin G.
Published in 2020 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus) (01.01.2020)
Published in 2020 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus) (01.01.2020)
Get full text
Conference Proceeding
A random traffic padding to limit packet size covert channels
Epishkina, Anna, Kogos, Konstantin
Published in 2015 Federated Conference on Computer Science and Information Systems (FedCSIS) (01.09.2015)
Published in 2015 Federated Conference on Computer Science and Information Systems (FedCSIS) (01.09.2015)
Get full text
Conference Proceeding
Touch and Move: Incoming Call User Authentication
Eremin, Aleksandr, Kogos, Konstantin, Valatskayte, Yana
Published in Information Systems Security and Privacy (2019)
Published in Information Systems Security and Privacy (2019)
Get full text
Book Chapter
Packet Length Covert Channel Capacity Estimation
Epishkina, Anna, Kogos, Konstantin
Published in 2016 6th International Conference on IT Convergence and Security (ICITCS) (01.09.2016)
Published in 2016 6th International Conference on IT Convergence and Security (ICITCS) (01.09.2016)
Get full text
Conference Proceeding
Covert Channels Parameters Evaluation Using the Information Theory Statements
Epishkina, Anna, Kogos, Konstantin
Published in 2015 5th International Conference on IT Convergence and Security (ICITCS) (01.08.2015)
Published in 2015 5th International Conference on IT Convergence and Security (ICITCS) (01.08.2015)
Get full text
Conference Proceeding
Quantum random number generator for secure communications
Epishkina, Anna, Kogos, Konstantin
Published in 2016 International Siberian Conference on Control and Communications (SIBCON) (01.05.2016)
Published in 2016 International Siberian Conference on Control and Communications (SIBCON) (01.05.2016)
Get full text
Conference Proceeding
Journal Article
Continuous Authentication of Smartphone Users via Swipes and Taps Analysis
Garbuz, Alina, Epishkina, Anna, Kogos, Konstantin
Published in 2019 European Intelligence and Security Informatics Conference (EISIC) (01.11.2019)
Published in 2019 European Intelligence and Security Informatics Conference (EISIC) (01.11.2019)
Get full text
Conference Proceeding