Maria Skvortsova

Maria Skvortsova
  • PhD of Computer Science
  • Associate Professor at Bauman Moscow State Technical University

About

24
Publications
2,841
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
102
Citations
Introduction
I am working in Bauman Moscow State Technical University. I know how to teach students, lead complex projects and love to do science and human resource management.
Current institution
Bauman Moscow State Technical University
Current position
  • Associate Professor
Additional affiliations
February 2015 - May 2019
Bauman Moscow State Technical University
Position
  • Teacher Assistant
Description
  • 1. Organization of interaction between developers and customers 2. Participation in software development (Intelligent system for MO) 3. Drawing up reports on projects 4. Courses "Databases", "Peripheral devices" 5. Conducting research, course and diploma design 6. Methodical, scientific and research work. 7. Participation in R&D and international scientific conferences. 8. Supervision by student groups. 9. Participation as an expert at school conferences and events.
February 2015 - present
Bauman Moscow State Technical University
Position
  • Researcher
Description
  • Researcher. Methodical and educational work. Help in the teaching of courses: "Peripheral devices"​, "Data Base", "Data mining"
Education
October 2015 - October 2019
Bauman Moscow State Technical University
Field of study
  • Theoretical Foundations of Informatics
July 2015 - October 2016
Wrexham University
Field of study
  • Computing
September 2014 - August 2016
Bauman Moscow State Technical University
Field of study
  • Intellectual systems

Publications

Publications (24)
Article
In this paper, we propose a novel approach to detect non-periodic Low-rate Denial of Service attacks in Software Defined Networks using Machine Learning algorithms. Low-rate Denial of Service attacks are a type of cyber-attack that aim to disrupt network services by sending low-rate traffic to the target system. These attacks can be difficult to de...
Conference Paper
The goal of this work is the research and comparative analysis of the algorithms for text data classification in the context of solving the problem of validating medical news. The goal is achieved by considering different classification methods and identifying their advantages in solving this problem. The study considers the approaches to evaluatin...
Conference Paper
Improvement of developments in recognizing human emotions is one of the tasks in the field of Internet behavior. Such developments can be used to determine a person's mood, workplace fatigue, and many other factors. This paper aims to study the performance of the convolutional neural network (CNN) in human emotion recognition and define the quality...
Article
Full-text available
The features of training specialists in the "artificial intelligence" profile are highlighted. Examples of educational programs and disciplines on intellectual technologies are given.
Conference Paper
Importance of this work comes from the fact that more and more attacks on information resources are made using HTML5 vulnerabilities every year. This work contains a theoretical study on the methods and possibilities of attacks using HTML5. Basic schemes of XSS and CSRF attacks, attacks on CORS, and intelligence-gathering activities in isolated net...
Conference Paper
Full-text available
The actual task of risk assessment is the ranking of news in accordance with the degree of a conflict situation. One of the metrics for ranking international events is the Goldstein scale. With this metric, each event is compared with the numerical value of conflict or cooperation. The meaning of these phrases may change if they are analyzed with t...
Conference Paper
This paper analyzes data leaks for different countries, taking into account the period of the Covid pandemic. The main dangers to society are described in the case of an increasing trend of personal data leakage of company customers and ordinary network users. The statistics are presented of accidental and intentional leaks of personal data in Russ...
Chapter
This paper discusses the vulnerabilities of automatic access monitoring and control systems widely used in everyday life. Two basic principles of information exchange in such devices are described. Study of amplitude-frequency characteristics of key fobs from various manufacturers of automatic access monitoring and control systems was undertaken. A...
Conference Paper
Full-text available
Hybrid intelligent systems allow people to organize their time and simplify their day-to-day life processes related to forming a meal plan. This paper describes a method of presenting knowledge of the modern expert system, a description of the methods of the recommender system as a part of a hybrid intelligent system is given. Special attention is...
Conference Paper
Full-text available
We considered project-based training as an approach to the training of engineers in modern conditions and proposed to implement it in the field of intelligent decision support methods. As a specific example, we suggested a metaanamorphization method, which allows us to activate the visual-figurative thinking mechanisms of the decision maker and fac...
Chapter
Full-text available
A statement and a general structure for solving the problem of assessing possible crisis situations in the Socio-political sphere is proposed. An approach to analyzing and forecasting the development of crisis situations has been implemented on the basis of continuous monitoring of heterogeneous data from various information sources and summarizing...
Conference Paper
Full-text available
This paper presents a parallel application which realizing the brute force method for solving the optimization task - work’s distribution between nodes of hierarchical systems. The principles of hierarchical control are used in different areas from political and social organizations to industrial corporations and public security forces. Aviation al...
Conference Paper
Full-text available
Currently developed hybrid intelligent systems that use a combination of traditional data processing methods and intelligent methods are able to analyze and assess the existing risks in all areas of human activity. This article shows the positive effect of cognitive computer visualization as a means of activating the mechanisms of visual-figurative...
Conference Paper
Full-text available
This article discusses the problem of the increase of machining process planning efficiency. The authors propose the way to design computer-aided process planning system based on modular approach to solve the problem. The first task was to change the subject of production and use specific elements of details, called a surface module. It is assumed...
Conference Paper
Full-text available
In the context of the socio-economic development of the world economy, as well as improvements in the field of automation of risk analysis and assessment processes intelligent methods are used more often. The article explores the possibility of creating a risk analysis decision support system using modern intelligent methods. Creating a decision su...
Conference Paper
Full-text available
The article analyzes the existing methods of self-diagnosis and first aid techniques. The authors investigated the existing systems in the presented area, identified the main problems of such systems. A comparative analysis of Russian and foreign analogues revealed that the main advantage of the system being developed is the combination of first ai...
Conference Paper
Mutual relations of countries, primarily in the socio-economic and political spheres, have been and are important aspects of fully-fledged development for centuries. In modern realities, different approaches are used for assessing different risks and threats, and decision support systems are created that allow real-time data collection, analysis an...
Conference Paper
This paper presents a hybrid intelligent system (HIS) for risk assessment based on unstructured information. The generalised structure of a hybrid intelligent system (HIS) and its implementation in various information systems are described using a number of case studies. The definitions of risk and unstructured information are discussed in the cont...

Network

Cited By