default search action
Dmitry Levshun
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j10]Diana Levshun, Dmitry Levshun, Elena Doynikova, Alexander Branitskiy, Igor V. Kotenko:
Considerations on sentiment of social network posts as a feature of destructive impacts. AI Commun. 37(4): 585-598 (2024) - [c20]Dmitry Levshun, Diana Levshun:
Selection of Machine Learning Methods for Keylogger Detection Based on Network Activity. COMSNETS 2024: 19-24 - [c19]Dmitry Levshun, Dmitry Vesnin:
Exploring BERT for Predicting Vulnerability Categories in Device Configurations. ICISSP 2024: 452-461 - 2023
- [j9]Olga Tushkanova, Dmitry Levshun, Alexander Branitskiy, Elena Fedorchenko, Evgenia Novikova, Igor V. Kotenko:
Detection of Cyberattacks and Anomalies in Cyber-Physical Systems: Approaches, Data Sources, Evaluation. Algorithms 16(2): 85 (2023) - [j8]Dmitry Levshun, Olga Tushkanova, Andrey Chechulin:
Two-model active learning approach for inappropriate information classification in social networks. Int. J. Inf. Sec. 22(6): 1921-1936 (2023) - [j7]Dmitry Vesnin, Dmitry Levshun, Andrey Chechulin:
Trademark Similarity Evaluation Using a Combination of ViT and Local Features. Inf. 14(7): 398 (2023) - [c18]Dmitry Levshun, Andrey Chechulin:
Vulnerability Categorization for Fast Multistep Attack Modelling. FRUCT 2023: 169-175 - [c17]Dmitry Levshun:
Comparative Analysis of Machine Learning Methods in Vulnerability Categories Prediction Based on Configuration Similarity. IDC 2023: 70-81 - 2022
- [j6]Dmitry Levshun, Andrey Chechulin, Igor V. Kotenko:
Security and Privacy Analysis of Smartphone-Based Driver Monitoring Systems from the Developer's Point of View. Sensors 22(13): 5063 (2022) - [c16]Diana Gaifulina, Alexander Branitskiy, Dmitry Levshun, Elena Doynikova, Igor V. Kotenko:
Sentiment Analysis of Social Network Posts for Detecting Potentially Destructive Impacts. IDC 2022: 203-212 - [c15]Dmitry Levshun, Olga Tushkanova, Andrey Chechulin:
Active learning approach for inappropriate information classification in social networks. PDP 2022: 283-289 - 2021
- [b1]Dmitry Levshun:
Models, algorithms and methodology for design of microcontroller-based physical security systems protected from cyber-physical attacks. (Modèles algorithmes et méthodologie pour la conception de systèmes de sécurité physique basés sur des microcontrôleurs protégés des attaques cyber-physiques). ITMO University, Saint Petersburg, Russian Federation, 2021 - [j5]Dmitry Levshun, Igor V. Kotenko, Andrey Chechulin:
The application of the methodology for secure cyber-physical systems design to improve the semi-natural model of the railway infrastructure. Microprocess. Microsystems 87: 103482 (2021) - [j4]Dmitry Levshun, Andrey Chechulin, Igor V. Kotenko:
Design of Secure Microcontroller-Based Systems: Application to Mobile Robots for Perimeter Monitoring. Sensors 21(24): 8451 (2021) - [c14]Elena Doynikova, Evgenia Novikova, Ivan Murenin, Maxim Kolomeec, Diana Gaifulina, Olga Tushkanova, Dmitry Levshun, Alexey Meleshko, Igor V. Kotenko:
Security Measuring System for IoT Devices. CyberICPS/SECPRE/ADIoT/SPOSE/CPS4CIP/CDT&SECOMANE@ESORICS 2021: 256-275 - [c13]Dmitry Levshun, Andrey Chechulin, Igor V. Kotenko:
A Technique for the Design of Abstract Models of Microcontroller-Based Physical Security Systems. IDC 2021: 397-406 - [c12]Konstantin E. Izrailov, Dmitry Levshun, Igor V. Kotenko, Andrey Chechulin:
Classification and Analysis of Vulnerabilities in Mobile Device Infrastructure Interfaces. MobiSec 2021: 301-319 - [c11]Maxim Kolomeets, Olga Tushkanova, Dmitry Levshun, Andrey Chechulin:
Camouflaged bot detection using the friend list. PDP 2021: 253-259 - 2020
- [j3]Dmitry Levshun, Yannick Chevalier, Igor V. Kotenko, Andrey Chechulin:
Design and verification of a mobile robot based on the integrated model of cyber-Physical systems. Simul. Model. Pract. Theory 105: 102151 (2020) - [c10]Daniel Zelle, Roland Rieke, Christian Plappert, Christoph Krauß, Dmitry Levshun, Andrey Chechulin:
SEPAD - Security Evaluation Platform for Autonomous Driving. PDP 2020: 413-420 - [c9]Maksim Kalameyets, Dmitry Levshun, Sergei Soloviev, Andrey Chechulin, Igor V. Kotenko:
Social networks bot detection using Benford's law. SIN 2020: 19:1-19:8
2010 – 2019
- 2019
- [j2]Alexander Branitskiy, Dmitry Levshun, Natalia Krasilnikova, Elena Doynikova, Igor V. Kotenko, Artem Tishkov, Nina Vanchakova, Andrey Chechulin:
Determination of Young Generation's Sensitivity to the Destructive Stimuli based on the Information in Social Networks. J. Internet Serv. Inf. Secur. 9(3): 1-20 (2019) - [c8]Alexander Branitskiy, Elena Doynikova, Igor V. Kotenko, Natalia Krasilnikova, Dmitry Levshun, Artem Tishkov, Nina Vanchakova:
The Common Approach to Determination of the Destructive Information Impacts and Negative Personal Tendencies of Young Generation Using the Neural Network Methods for the Internet Content Processing. IDC 2019: 302-310 - [c7]Dmitry Levshun, Igor V. Kotenko, Andrey Chechulin:
The Integrated Model of Secure Cyber-Physical Systems for Their Design and Verification. IDC 2019: 333-343 - [c6]Dmitry Levshun, Yurii Bakhtin, Andrey Chechulin, Igor V. Kotenko:
Analysis of Attack Actions on the Railway Infrastructure Based on the Integrated Model. MobiSec 2019: 145-162 - [c5]Dmitry Levshun, Andrey Chechulin, Igor V. Kotenko, Yannick Chevalier:
Design and Verification Methodology for Secure and Distributed Cyber-Physical Systems. NTMS 2019: 1-5 - 2018
- [c4]Dmitry Levshun, Andrey Chechulin, Igor V. Kotenko:
A technique for design of secure data transfer environment: Application for I2C protocol. ICPS 2018: 789-794 - 2017
- [c3]Dmitry Levshun, Andrey Chechulin, Igor V. Kotenko:
Design lifecycle for secure cyber-physical systems based on embedded devices. IDAACS 2017: 277-282 - [c2]Daniil A. Bashmakov, Anatoliy G. Korobeynikov, Alexey V. Sivachev, Didier El Baz, Dmitry Levshun:
Method for Predicting Pixel Values in Background Areas in the Problem of Weighted Steganalysis in the Spatial Domain of Natural Images Under Small Payloads. MobiSec 2017: 65-82 - 2016
- [j1]Vasily Desnitsky, Dmitry Levshun, Andrey Chechulin, Igor V. Kotenko:
Design Technique for Secure Embedded Devices: Application for Creation of Integrated Cyber-Physical Security System. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 7(2): 60-80 (2016) - [c1]Vasily Desnitsky, Andrey Chechulin, Igor V. Kotenko, Dmitry Levshun, Maxim Kolomeec:
Application of a Technique for Secure Embedded Device Design Based on Combining Security Components for Creation of a Perimeter Protection System. PDP 2016: 609-616
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-30 20:33 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint