Follow
Andrey Dolgikh
Andrey Dolgikh
Binghamton University
Verified email at acm.org
Title
Cited by
Cited by
Year
Unmanned aerial vehicle security using recursive parameter estimation
Z Birnbaum, A Dolgikh, V Skormin, E O’Brien, D Muller, C Stracquodaine
Journal of Intelligent & Robotic Systems 84, 107-120, 2016
962016
Unmanned aerial vehicle security using behavioral profiling
Z Birnbaum, A Dolgikh, V Skormin, E O'Brien, D Muller, C Stracquodaine
2015 International Conference on Unmanned Aircraft Systems (ICUAS), 1310-1319, 2015
602015
Industrial control systems security testbed
E Korkmaz, A Dolgikh, M Davis, V Skormin
11th Annual Symposium on Information Assurance, 13-18, 2016
282016
Expressive, efficient and obfuscation resilient behavior based IDS
AG Tokhtabayev, VA Skormin, AM Dolgikh
Computer Security–ESORICS 2010: 15th European Symposium on Research in …, 2010
282010
ICS security testbed with delay attack case study
E Korkmaz, A Dolgikh, M Davis, V Skormin
MILCOM 2016-2016 IEEE Military Communications Conference, 283-288, 2016
202016
Cloud security auditing based on behavioral modeling
Z Birnbaum, B Liu, A Dolgikh, Y Chen, V Skormin
2013 IEEE Ninth World Congress on Services, 268-273, 2013
172013
Detection and mitigation of time delay injection attacks on industrial control systems with PLCs
E Korkmaz, M Davis, A Dolgikh, V Skormin
Computer Network Security: 7th International Conference on Mathematical …, 2017
162017
Unmanned Aerial System security using real-time autopilot software analysis
C Stracquodaine, A Dolgikh, M Davis, V Skormin
2016 International Conference on Unmanned Aircraft Systems (ICUAS), 830-839, 2016
162016
Using behavioral modeling and customized normalcy profiles as protection against targeted cyber-attacks
A Dolgikh, T Nykodym, V Skormin, Z Birnbaum
Computer Network Security: 6th International Conference on Mathematical …, 2012
162012
Colored Petri nets as the enabling technology in intrusion detection systems
A Dolgikh, T Nykodym, V Skormin, J Antonakos, M Baimukhamedov
2011-MILCOM 2011 Military Communications Conference, 1297-1301, 2011
142011
Detection of worm propagation engines in the system call domain using colored petri nets
AG Tokhtabayev, VA Skormin, AM Dolgikh
2008 IEEE International Performance, Computing and Communications Conference …, 2008
122008
Behavioral modeling for suspicious process detection in cloud computing environments
A Dolgikh, Z Birnbaum, Y Chen, V Skormin
2013 IEEE 14th International Conference on Mobile Data Management 2, 177-181, 2013
112013
The behavioral approach to diagnostics of cyber-physical systems
V Skormin, A Dolgikh, Z Birnbaum
2014 IEEE AUTOTEST, 26-30, 2014
82014
Dynamic, resilient detection of complex malicious functionalities in the system call domain
A Tokhtabayev, V Skormin, A Dolgikh
2010-MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE, 1349-1356, 2010
82010
Computer network testbed at binghamton university
A Dolgikh, T Nykodym, V Skormin, J Antonakos
2011-MILCOM 2011 Military Communications Conference, 1146-1151, 2011
72011
Resident security system for government/industry owned computers
M Davis, E Korkmaz, A Dolgikh, V Skormin
Computer Network Security: 7th International Conference on Mathematical …, 2017
62017
Automatic functionality detection in behavior-based ids
T Nykodym, V Skormin, A Dolgikh, J Antonakos
2011-MILCOM 2011 Military Communications Conference, 1302-1307, 2011
62011
Cloud security auditing based on behavioural modelling
A Dolgikh, Z Birnbaum, B Liu, Y Chen, V Skormin
International Journal of Business Process Integration and Management 7 (2 …, 2014
52014
Behavior based approach for intrusion detection systems
A Dolgikh
State University of New York at Binghamton, 2013
52013
Customized behavioral normalcy profiles for critical infrastructure protection
A Dolgikh, Z Birnbaum, V Skormin
8th Annual Symposium on Information Assurance (ASIA 2013), Albany, NY, 15-22, 2013
42013
The system can't perform the operation now. Try again later.
Articles 1–20