Alexander Adamov

Alexander Adamov
  • Kharkiv National University of Radio Electronics

About

13
Publications
5,304
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
99
Citations
Introduction
1. Security testing of security products: Antiviruses (HIPS), Backup solutions, Anti-ransomware solutions, Anti-cryptojacking (cryptomining) solutions, Next-Generation Firewalls (NGFW), etc. 2. Malware analysis 3. R&D: AI / ML methods and models for cyberattacks detection and malware analysis 4. Education -Advanced Malware Analysis course (7.5 ETCS in the EU master program in cybersecurity) -Reverse engineering (x86, ARM) course -Machine Learning in cybersecurity course -Threat hunting training -Threat modeling training -Cloud security training -Incident response training -Supervising Master and PhD students Contacts: e-mail: ada@nioguard.com https://twitter.com/Alex_Ad
Current institution
Kharkiv National University of Radio Electronics

Publications

Publications (13)
Conference Paper
Full-text available
This paper addresses the problem of incident response in clouds. A conventional incident response model is formulated to be used as a basement for the cloud incident response model. Minimization of incident handling time is considered as a key criterion of the proposed cloud incident response model that can be done at the expense of embedding infra...
Conference Paper
Full-text available
This paper addresses the problem of protecting cloud environments against targeted attacks, which have become a popular mean of gaining access to organization's confidential information and resources of cloud providers. Only in 2015 eleven targeted attacks have been discovered by Kaspersky Lab. One of them-Duqu2-successfully attacked the Lab itself...
Conference Paper
In this paper it is proposed an universal criterion and structures for evaluating the quality of object interaction in the deterministic cyberspace through the use of only the logical operations to determine the distances between the processes and phenomena by developing high-performance parallel processors, focused on effective solving the problem...
Conference Paper
Botnets became the powerful cyber weapon that involves tens of millions of infected computers - “cyber zombies” - all over the world. The security industry makes efforts to prevent spreading botnets and compromising an Individual Cyberspace (IC)[1] of users in such way. However, botnets continue existing despite numerous takedowns initiated by anti...
Conference Paper
Transaction level model of embedded processor for improving the performance of logical relation analysis are proposed. It is based on the hardware implementation of vector operations. There are examples of the model using for the semantics analysis of Russian adjectives. The embedded processor was designed to be part of SoC that will be implemented...
Article
This paper describes a security model for protection of individual cyberspace (ICS) as a way of ensuring a secured user's virtual environment. A concept of cyberspace and its main definitions is determined, as well as a formal model that describes mapping of prototypes in cyberspace into real-world objects. Based on analysis of contemporary securit...
Article
A typical System-on-Chip integrates many blocks including peripheral IPs, buses, complex interconnects, multiple processors, memory, clock and power distribution, test structures, and buses. There are always several master blocks on the bus, resulting in complex bus architectures. That is why new system level approach in design and verification has...
Conference Paper
Modern verification environments based on object-oriented methodology is a system-level solution that manages the process and data for a particular system-on-chip model. These systems give an ability to integrate smaller blocks of design into larger blocks, which may eventually be integrated into a system. That is reason for performing designing an...

Network

Cited By