The state of ransomware. Trends and mitigation techniques A Adamov, A Carlsson 2017 IEEE East-West Design & Test Symposium (EWDTS), 1-8, 2017 | 44 | 2017 |
An analysis of lockergoga ransomware A Adamov, A Carlsson, T Surmacz 2019 IEEE East-West Design & Test Symposium (EWDTS), 1-5, 2019 | 35 | 2019 |
Reinforcement learning for anti-ransomware testing A Adamov, A Carlsson 2020 IEEE East-West Design & Test Symposium (EWDTS), 1-5, 2020 | 26 | 2020 |
The problem of Hardware Trojans detection in System-on-Chip A Adamov, A Saprykin, D Melnik, O Lukashenko 2009 10th International Conference-The Experience of Designing and …, 2009 | 22 | 2009 |
The state of ransomware. Trends and mitigation techniques. 2017 IEEE East-West Design Test Symposium(EWDTS), 1-8 A Adamov, A Carlsson IEEE, 2017 | 11 | 2017 |
Electronic system level models for functional verification of system-on-chip A Adamov, K Mostovaya, I Syzonenko, A Melnik 2007 9th International Conference-The Experience of Designing and …, 2007 | 9 | 2007 |
Cloud incident response model A Adamov, A Carlsson 2016 IEEE East-West Design & Test Symposium (EWDTS), 1-3, 2016 | 7 | 2016 |
Computer Threats: Methods of Detection and Analysis A Adamov Kaspersky Lab, Moscow, 2009 | 6 | 2009 |
Discovering new indicators for botnet traffic detection A Adamov, V Hahanov, A Carlsson Proceedings of IEEE East-West Design & Test Symposium (EWDTS 2014), 1-5, 2014 | 5 | 2014 |
Transaction level model of embedded processor for vector-logical analysis IV Hahanova, V Obrizan, A Adamov, D Shcherbin East-West Design & Test Symposium (EWDTS 2013), 1-4, 2013 | 4 | 2013 |
Analysis and Detection of Polymorphic Spyware A Adamov, A Saprykin Hakin9 Magazine 8 (01), 6-11, 2013 | 4 | 2013 |
A security model of individual cyberspace A Adamov, V Hahanov 2011 9th East-West Design & Test Symposium (EWDTS), 169-172, 2011 | 4 | 2011 |
The problem of Trojan inclusions in software and hardware A Adamov, A Saprykin 2010 East-West Design & Test Symposium (EWDTS), 449-451, 2010 | 4 | 2010 |
Data mining techniques for a functional verification of SoC A Adamov, R Hwang, A Gavrushenko 2008 International Conference on" Modern Problems of Radio Engineering …, 2008 | 4 | 2008 |
A sandboxing method to protect cloud cyberspace A Adamov, A Carlsson 2015 IEEE East-West Design & Test Symposium (EWDTS), 1-3, 2015 | 3 | 2015 |
Security risks in hardware: implementation and detection problem A Adamov, V Hahanov 2010 East-West Design & Test Symposium (EWDTS), 425-427, 2010 | 3 | 2010 |
Educating the Next Generation MSc in Cyber Security A Carlsson, I Sokolianska, A Adamov | 1 | 2019 |
Structures for information retrieval in big data V Hahanov, S Chumachenko, E Litvinova, A Adamov, K Sorudeykin The Experience of Designing and Application of CAD Systems in …, 2015 | 1 | 2015 |
.NET Reflective Code Loading used by Turla and Sandworm in the Russia-Ukraine War A Adamov DeepSec IDSC 2023 Europe 2023, https://deepsec.net/, 2023 | | 2023 |
Turla and Sandworm come filelessly A Adamov Virus Bulletin International Conference 33, 509-510, 2023 | | 2023 |