BibTeX records: Nikolai A. Grusho

download as .bib file

@article{DBLP:journals/accs/GrushoGZT18,
  author    = {Alexander A. Grusho and
               Nikolai A. Grusho and
               M. I. Zabezhaylo and
               Elena E. Timonina},
  title     = {Protection of Valuable Information in Information Technologies},
  journal   = {Automatic Control and Computer Sciences},
  volume    = {52},
  number    = {8},
  pages     = {1076--1079},
  year      = {2018},
  url       = {https://doi.org/10.3103/S0146411618080138},
  doi       = {10.3103/S0146411618080138},
  timestamp = {Mon, 11 Mar 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/accs/GrushoGZT18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/accs/GrushoGT17,
  author    = {Alexander A. Grusho and
               Nikolai A. Grusho and
               Elena E. Timonina},
  title     = {Information security architecture synthesis in distributed information
               computation systems},
  journal   = {Automatic Control and Computer Sciences},
  volume    = {51},
  number    = {8},
  pages     = {799--804},
  year      = {2017},
  url       = {https://doi.org/10.3103/S0146411617080089},
  doi       = {10.3103/S0146411617080089},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/accs/GrushoGT17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icumt/GrushoGLT17,
  author    = {Alexander A. Grusho and
               Nick A. Grusho and
               Michael Levykin and
               Elena E. Timonina},
  title     = {Analysis of information security of distributed information systems},
  booktitle = {9th International Congress on Ultra Modern Telecommunications and
               Control Systems and Workshops, {ICUMT} 2017, Munich, Germany, November
               6-8, 2017},
  pages     = {96--100},
  year      = {2017},
  crossref  = {DBLP:conf/icumt/2017},
  url       = {https://doi.org/10.1109/ICUMT.2017.8255143},
  doi       = {10.1109/ICUMT.2017.8255143},
  timestamp = {Fri, 26 Jan 2018 16:37:12 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icumt/GrushoGLT17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/GrushoGZZT17,
  author    = {Alexander A. Grusho and
               Nick A. Grusho and
               Michael I. Zabezhailo and
               Alexander Zatsarinny and
               Elena E. Timonina},
  title     = {Information Security of {SDN} on the Basis of Meta Data},
  booktitle = {Computer Network Security - 7th International Conference on Mathematical
               Methods, Models, and Architectures for Computer Network Security,
               {MMM-ACNS} 2017, Warsaw, Poland, August 28-30, 2017, Proceedings},
  pages     = {339--347},
  year      = {2017},
  crossref  = {DBLP:conf/mmmacns/2017},
  url       = {https://doi.org/10.1007/978-3-319-65127-9\_27},
  doi       = {10.1007/978-3-319-65127-9\_27},
  timestamp = {Thu, 21 Sep 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/mmmacns/GrushoGZZT17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/accs/GrushoGZT16,
  author    = {Alexander A. Grusho and
               Nikolai A. Grusho and
               Michael I. Zabezhailo and
               Elena E. Timonina},
  title     = {Intelligent data analysis in information security},
  journal   = {Automatic Control and Computer Sciences},
  volume    = {50},
  number    = {8},
  pages     = {722--725},
  year      = {2016},
  url       = {https://doi.org/10.3103/S0146411616080307},
  doi       = {10.3103/S0146411616080307},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/accs/GrushoGZT16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecms/GrushoGT16,
  author    = {Alexander A. Grusho and
               Nick A. Grusho and
               Elena E. Timonina},
  title     = {Statistical Classification In Monitoring Systems},
  booktitle = {30th European Conference on Modelling and Simulation, {ECMS} 2016,
               Regensburg, Germany, May 31 - June 3, 2016, Proceedings.},
  pages     = {658--662},
  year      = {2016},
  crossref  = {DBLP:conf/ecms/2016},
  url       = {https://doi.org/10.7148/2016-0658},
  doi       = {10.7148/2016-0658},
  timestamp = {Thu, 25 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ecms/GrushoGT16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icumt/GrushoGT16,
  author    = {Alexander A. Grusho and
               Nick A. Grusho and
               Elena E. Timonina},
  title     = {Detection of anomalies in non-numerical data},
  booktitle = {8th International Congress on Ultra Modern Telecommunications and
               Control Systems and Workshops, {ICUMT} 2016, Lisbon, Portugal, October
               18-20, 2016},
  pages     = {273--276},
  year      = {2016},
  crossref  = {DBLP:conf/icumt/2016},
  url       = {https://doi.org/10.1109/ICUMT.2016.7765370},
  doi       = {10.1109/ICUMT.2016.7765370},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icumt/GrushoGT16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecms/GrushoGT15,
  author    = {Alexander A. Grusho and
               Nick A. Grusho and
               Elena E. Timonina},
  title     = {Power Functions Of Statistical Criteria Defined By Bans},
  booktitle = {29th European Conference on Modelling and Simulation, {ECMS} 2015,
               Albena (Varna), Bulgaria, May 26-29, 2015. Proceedings.},
  pages     = {617--621},
  year      = {2015},
  crossref  = {DBLP:conf/ecms/2015},
  url       = {https://doi.org/10.7148/2015-0617},
  doi       = {10.7148/2015-0617},
  timestamp = {Thu, 15 Jun 2017 21:41:03 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ecms/GrushoGT15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecms/GrushoGT14,
  author    = {Alexander A. Grusho and
               Nikolai A. Grusho and
               Elena E. Timonina},
  title     = {Generation Of Probability Measures With The Given Specification Of
               The Smallest Bans},
  booktitle = {28th European Conference on Modelling and Simulation, {ECMS} 2014,
               Brescia, Italy, May 27-30, 2014},
  pages     = {565--569},
  year      = {2014},
  crossref  = {DBLP:conf/ecms/2014},
  url       = {https://doi.org/10.7148/2014-0565},
  doi       = {10.7148/2014-0565},
  timestamp = {Thu, 25 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ecms/GrushoGT14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecms/GrushoGT13,
  author    = {Alexander A. Grusho and
               Nikolai A. Grusho and
               Elena E. Timonina},
  title     = {Criteria On Statistically Defined Bans},
  booktitle = {Proceedings of the 27th European Conference on Modelling and Simulation,
               {ECMS} 2013, {\AA}lesund, Norway, May 27-30, 2013},
  pages     = {610--612},
  year      = {2013},
  crossref  = {DBLP:conf/ecms/2013},
  url       = {https://doi.org/10.7148/2013-0610},
  doi       = {10.7148/2013-0610},
  timestamp = {Thu, 25 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ecms/GrushoGT13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/GrushoGT12,
  author    = {Alexander A. Grusho and
               Nikolai A. Grusho and
               Elena E. Timonina},
  title     = {Alternative Mechanisms for Information Security},
  booktitle = {Computer Network Security - 6th International Conference on Mathematical
               Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
               2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings},
  pages     = {108--113},
  year      = {2012},
  crossref  = {DBLP:conf/mmmacns/2012},
  url       = {https://doi.org/10.1007/978-3-642-33704-8\_10},
  doi       = {10.1007/978-3-642-33704-8\_10},
  timestamp = {Wed, 24 May 2017 08:28:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/mmmacns/GrushoGT12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/GrushoGT10,
  author    = {Alexander A. Grusho and
               Nikolai A. Grusho and
               Elena E. Timonina},
  title     = {Problems of Modeling in the Analysis of Covert Channels},
  booktitle = {Computer Network Security, 5th International Conference on Mathematical
               Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
               2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings},
  pages     = {118--124},
  year      = {2010},
  crossref  = {DBLP:conf/mmmacns/2010},
  url       = {https://doi.org/10.1007/978-3-642-14706-7\_9},
  doi       = {10.1007/978-3-642-14706-7\_9},
  timestamp = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/mmmacns/GrushoGT10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icumt/2017,
  title     = {9th International Congress on Ultra Modern Telecommunications and
               Control Systems and Workshops, {ICUMT} 2017, Munich, Germany, November
               6-8, 2017},
  publisher = {{IEEE}},
  year      = {2017},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=8241503},
  isbn      = {978-1-5386-3435-6},
  timestamp = {Fri, 26 Jan 2018 16:37:12 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icumt/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/mmmacns/2017,
  editor    = {Jacek Rak and
               John Bay and
               Igor V. Kotenko and
               Leonard J. Popyack and
               Victor A. Skormin and
               Krzysztof Szczypiorski},
  title     = {Computer Network Security - 7th International Conference on Mathematical
               Methods, Models, and Architectures for Computer Network Security,
               {MMM-ACNS} 2017, Warsaw, Poland, August 28-30, 2017, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10446},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-65127-9},
  doi       = {10.1007/978-3-319-65127-9},
  isbn      = {978-3-319-65126-2},
  timestamp = {Tue, 15 Aug 2017 09:46:47 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/mmmacns/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ecms/2016,
  editor    = {Thorsten Claus and
               Frank Herrmann and
               Michael Manitz and
               Oliver Rose},
  title     = {30th European Conference on Modelling and Simulation, {ECMS} 2016,
               Regensburg, Germany, May 31 - June 3, 2016, Proceedings},
  publisher = {European Council for Modeling and Simulation},
  year      = {2016},
  url       = {https://doi.org/10.7148/2016},
  doi       = {10.7148/2016},
  isbn      = {978-0-9932440-2-5},
  timestamp = {Thu, 25 May 2017 00:42:38 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ecms/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icumt/2016,
  title     = {8th International Congress on Ultra Modern Telecommunications and
               Control Systems and Workshops, {ICUMT} 2016, Lisbon, Portugal, October
               18-20, 2016},
  publisher = {{IEEE}},
  year      = {2016},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7761914},
  isbn      = {978-1-4673-8818-4},
  timestamp = {Sun, 11 Dec 2016 12:40:06 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icumt/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ecms/2015,
  editor    = {Valeri M. Mladenov and
               Grisha Spasov and
               Petia Georgieva and
               Galidia Petrova},
  title     = {29th European Conference on Modelling and Simulation, {ECMS} 2015,
               Albena (Varna), Bulgaria, May 26-29, 2015. Proceedings},
  publisher = {European Council for Modeling and Simulation},
  year      = {2015},
  url       = {https://doi.org/10.7148/2015},
  doi       = {10.7148/2015},
  isbn      = {978-0-9932440-0-1},
  timestamp = {Thu, 15 Jun 2017 21:41:03 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ecms/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ecms/2014,
  editor    = {Flaminio Squazzoni and
               Fabio Baronio and
               Claudia Archetti and
               Marco Castellani},
  title     = {28th European Conference on Modelling and Simulation, {ECMS} 2014,
               Brescia, Italy, May 27-30, 2014},
  publisher = {European Council for Modeling and Simulation},
  year      = {2014},
  url       = {https://doi.org/10.7148/2014},
  doi       = {10.7148/2014},
  isbn      = {978-0-9564944-8-1},
  timestamp = {Thu, 25 May 2017 00:42:37 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ecms/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ecms/2013,
  editor    = {Webj{\o}rn Rekdalsbakken and
               Robin T. Bye and
               Houxiang Zhang},
  title     = {Proceedings of the 27th European Conference on Modelling and Simulation,
               {ECMS} 2013, {\AA}lesund, Norway, May 27-30, 2013},
  publisher = {European Council for Modeling and Simulation},
  year      = {2013},
  url       = {https://doi.org/10.7148/2013},
  doi       = {10.7148/2013},
  isbn      = {978-0-9564944-6-7},
  timestamp = {Thu, 25 May 2017 00:42:37 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ecms/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/mmmacns/2012,
  editor    = {Igor V. Kotenko and
               Victor A. Skormin},
  title     = {Computer Network Security - 6th International Conference on Mathematical
               Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
               2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7531},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-33704-8},
  doi       = {10.1007/978-3-642-33704-8},
  isbn      = {978-3-642-33703-1},
  timestamp = {Wed, 24 May 2017 08:28:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/mmmacns/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/mmmacns/2010,
  editor    = {Igor V. Kotenko and
               Victor A. Skormin},
  title     = {Computer Network Security, 5th International Conference on Mathematical
               Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
               2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6258},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-14706-7},
  doi       = {10.1007/978-3-642-14706-7},
  isbn      = {978-3-642-14705-0},
  timestamp = {Wed, 24 May 2017 08:28:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/mmmacns/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
maintained by Schloss Dagstuhl LZI, founded at University of Trier