default search action
Evgeny Pavlenko
Person information
- affiliation: St. Petersburg Polytechnic University, Russia
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j29]E. Yu. Pavlenko, M. A. Pakhomov:
Graph-Based Self-Regulation for Different Types of Networks with Adaptive Topology. Autom. Control. Comput. Sci. 57(8): 1055-1062 (2023) - [j28]E. Yu. Pavlenko:
Analysis and Forecasting of States of Industrial Networks with Adaptive Topology Based on Network Motifs. Autom. Control. Comput. Sci. 57(8): 1084-1095 (2023) - [j27]Daria S. Lavrova, V. M. Bogina, Dmitry P. Zegzhda, E. Yu. Pavlenko:
Probabilistic Approach to Estimate the Cyber Resistance of Mobile Networks Based on Their Connectivity. Autom. Control. Comput. Sci. 57(8): 1103-1115 (2023) - [j26]Evgeniy Y. Pavlenko, K. V. Vasil'eva, Daria S. Lavrova, Dmitry P. Zegzhda:
Counteraction the cybersecurity threats of the in-vehicle local network. J. Comput. Virol. Hacking Tech. 19(3): 399-408 (2023) - 2022
- [j25]A. D. Fatin, E. Yu. Pavlenko:
Immunization of Complex Networks: Topology and Methods. Autom. Control. Comput. Sci. 56(8): 898-905 (2022) - [j24]E. Yu. Pavlenko:
Systematization of Cyber Threats to Large-Scale Systems with Adaptive Network Topology. Autom. Control. Comput. Sci. 56(8): 906-915 (2022) - [j23]E. Yu. Pavlenko, A. D. Fatin:
Immunization of Complex Networks: System of Differential Equations and Dynamic Variation. Autom. Control. Comput. Sci. 56(8): 942-946 (2022) - [j22]E. Yu. Pavlenko, I. S. Eremenko, A. D. Fatin:
Computer Network Clustering Methods in Cybersecurity Problems. Autom. Control. Comput. Sci. 56(8): 957-963 (2022) - [j21]E. Yu. Pavlenko:
Functional Model of Adaptive Network Topology of Large-Scale Systems Based on Dynamical Graph Theory. Autom. Control. Comput. Sci. 56(8): 1016-1024 (2022) - 2021
- [j20]M. D. Stepanov, E. Yu. Pavlenko, Daria S. Lavrova:
Detecting Network Attacks on Software Configured Networks Using the Isolating Forest Algorithm. Autom. Control. Comput. Sci. 55(8): 1039-1050 (2021) - [j19]A. D. Fatin, E. Yu. Pavlenko:
Using the Neat-Hypercube Mechanism to Detect Cyber Attacks on IoT Systems. Autom. Control. Comput. Sci. 55(8): 1111-1114 (2021) - [j18]Dmitry P. Zegzhda, Evgeny Pavlenko, Elena B. Aleksandrova:
Modelling Artificial Immunization Processes to Counter Cyberthreats. Symmetry 13(12): 2453 (2021) - 2020
- [j17]E. Yu. Pavlenko, K. V. Kudinov:
Ensuring Cyber Resilience of Large-Scale Network Infrastructure Using the Ant Algorithm. Autom. Control. Comput. Sci. 54(8): 793-802 (2020) - [j16]E. Yu. Pavlenko, M. D. Stepanov:
Countering Cyberattacks against Intelligent Bioinspired Systems Based on FANET. Autom. Control. Comput. Sci. 54(8): 822-828 (2020) - [j15]K. V. Vasil'eva, E. Yu. Pavlenko, P. V. Sem'yanov:
Analysis of Safety Methods for a New Generation of Automobiles. Autom. Control. Comput. Sci. 54(8): 915-921 (2020) - [j14]A. D. Fatin, E. Yu. Pavlenko, Maria A. Poltavtseva:
A Survey of Mathematical Methods for Security Analysis of Cyberphysical Systems. Autom. Control. Comput. Sci. 54(8): 983-987 (2020) - [j13]Dmitry P. Zegzhda, Daria S. Lavrova, Evgeny Pavlenko, Anna A. Shtyrkina:
Cyber Attack Prevention Based on Evolutionary Cybernetics Approach. Symmetry 12(11): 1931 (2020)
2010 – 2019
- 2019
- [j12]E. Yu. Pavlenko:
Model of Cyberattacks on Digital Production Systems. Autom. Control. Comput. Sci. 53(8): 1017-1019 (2019) - [j11]E. Yu. Pavlenko:
Detection of Information Security Breaches in a Digital Production System Based on the Component Interaction Model. Autom. Control. Comput. Sci. 53(8): 1020-1022 (2019) - [c12]Evgeny Pavlenko, Dmitry P. Zegzhda, Anna A. Shtyrkina:
Estimating the sustainability of cyber-physical systems based on spectral graph theory. BlackSeaCom 2019: 1-5 - [c11]Maria A. Poltavtseva, Dmitry P. Zegzhda, Evgeniy Y. Pavlenko:
High-performance NIDS Architecture for Enterprise Networking. BlackSeaCom 2019: 1-3 - [c10]Evgeny Pavlenko, Dmitry P. Zegzhda, Maria A. Poltavtseva:
Ensuring the sustainability of cyberphysical systems based on dynamic reconfiguration. ICPS 2019: 785-789 - 2018
- [j10]Dmitry P. Zegzhda, E. Yu. Pavlenko:
Cyber-sustainability of Software-Defined Networks Based on Situational Management. Autom. Control. Comput. Sci. 52(8): 984-992 (2018) - [j9]Dmitry P. Zegzhda, E. S. Usov, V. A. Nikol'skii, E. Yu. Pavlenko:
Ensuring Secure Data Input/Output Operations for SGX ENCLAVE. Autom. Control. Comput. Sci. 52(8): 1036-1041 (2018) - [j8]E. S. Usov, V. A. Nikol'skii, E. Yu. Pavlenko, Dmitry P. Zegzhda:
Architecture of the Protected Cloud Data Storage Using Intel SGX Technology. Autom. Control. Comput. Sci. 52(8): 1144-1149 (2018) - [j7]Dmitry P. Zegzhda, E. Yu. Pavlenko:
Digital Manufacturing Security Indicators. Autom. Control. Comput. Sci. 52(8): 1150-1159 (2018) - [c9]Evgeny Pavlenko, Dmitry P. Zegzhda:
Sustainability of cyber-physical systems in the context of targeted destructive influences. ICPS 2018: 830-834 - [c8]Peter D. Zegzhda, Dmitry P. Zegzhda, Evgeny Pavlenko, Gleb Ignatev:
Applying deep learning techniques for Android malware detection. SIN 2018: 7:1-7:8 - 2017
- [j6]Dmitry P. Zegzhda, Evgeny Pavlenko:
Cyber-physical system homeostatic security management. Autom. Control. Comput. Sci. 51(8): 805-816 (2017) - [j5]E. Yu. Pavlenko, A. V. Yarmak, Dmitry A. Moskvin:
Hierarchical approach to analyzing security breaches in information systems. Autom. Control. Comput. Sci. 51(8): 829-834 (2017) - [j4]Dmitry P. Zegzhda, E. S. Usov, V. A. Nikol'skii, Evgeny Pavlenko:
Use of Intel SGX to ensure the confidentiality of data of cloud users. Autom. Control. Comput. Sci. 51(8): 848-854 (2017) - [j3]E. Yu. Pavlenko, A. V. Yarmak, Dmitry A. Moskvin:
Application of clustering methods for analyzing the security of Android applications. Autom. Control. Comput. Sci. 51(8): 867-873 (2017) - [j2]Peter D. Zegzhda, E. V. Malyshev, Evgeny Pavlenko:
The use of an artificial neural network to detect automatically managed accounts in social networks. Autom. Control. Comput. Sci. 51(8): 874-880 (2017) - [c7]Peter D. Zegzhda, Dmitry P. Zegzhda, Evgeny Pavlenko, Andrew Dremov:
Detecting Android application malicious behaviors based on the analysis of control flows and data flows. SIN 2017: 280-283 - 2015
- [j1]Maxim O. Kalinin, Evgeny Pavlenko:
Increasing the fault tolerance and availability of software defined networks using network equipment control based on multiobjective optimization by service quality parameters. Autom. Control. Comput. Sci. 49(8): 673-678 (2015) - 2011
- [b1]Evgeny Pavlenko:
New solving techniques for property checking of arithmetic data paths (Neue Beweistechniken für die Eignungsprüfung von arithmetischen Datenpfaden). University of Kaiserslautern, 2011, pp. 1-137 - [c6]Evgeny Pavlenko, Markus Wedler, Dominik Stoffel, Wolfgang Kunz, Alexander Dreyer, Frank Seelisch, Gert-Martin Greuel:
STABLE: A new QF-BV SMT solver for hard verification problems combining Boolean reasoning with computer algebra. DATE 2011: 155-160 - [c5]Evgeny Pavlenko, Markus Wedler, Dominik Stoffel, Wolfgang Kunz, Alexander Dreyer, Frank Seelisch, Gert-Martin Greuel:
STABLE: A new QF-BV SMT Solver for hard Verification Problems combining Boolean Reasoning with Computer Algebra. MBMV 2011: 51-60
2000 – 2009
- 2009
- [i1]Markus Wedler, Evgeny Pavlenko, Alexander Dreyer, Frank Seelisch, Dominik Stoffel, Gert-Martin Greuel, Wolfgang Kunz:
Solving hard instances in QF-BV combining Boolean reasoning with computer algebra. Algorithms and Applications for Next Generation SAT Solvers 2009 - 2008
- [c4]Evgeny Pavlenko, Markus Wedler, Dominik Stoffel, Wolfgang Kunz, Oliver Wienand, Evgeny Karibaev:
Modeling of Custom-Designed Arithmetic Components for ABL Normalization. FDL 2008: 124-129 - [c3]Evgeny Pavlenko, Markus Wedler, Dominik Stoffel, Wolfgang Kunz, Oliver Wienand, Evgeny Karibaev:
A New Verification Technique for Custom-Designed Components at the Arithmetic Bit Level. FDL (Selected Papers) 2008: 257-272 - [c2]Evgeny Pavlenko, Markus Wedler, Dominik Stoffel, Wolfgang Kunz, Oliver Wienand, Evgeny Karibaev:
Modeling of Custom-Designed Arithmetic Components for ABL Normalization. MBMV 2008: 51-60 - 2007
- [c1]Evgeny Pavlenko, Markus Wedler, Dominik Stoffel, Wolfgang Kunz:
Arithmetic Constraints in SAT-based Property Checking. MBMV 2007: 91-100
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:52 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint