Maxim Abramov

Maxim Abramov
  • Ph.D. Engineering Science
  • Head of Department at St. Petersburg Federal Research Center of the Russian Academy of Sciences

About

48
Publications
2,039
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
173
Citations
Introduction
Leading Researcher and Head of the Laboratory of Applied Artificial Intelligence of the St. Petersburg Federal Research Center of the Russian Academy of Sciences
Current institution
St. Petersburg Federal Research Center of the Russian Academy of Sciences
Current position
  • Head of Department
Additional affiliations
September 2016 - present
St Petersburg University
Position
  • Assistant professor
Education
September 2013 - June 2018
St. Petersburg Federal Research Center of the Russian Academy of Sciences
Field of study
  • Methods and algorithms for analyzing the security of users of information systems from social engineering attacks: estimation of model parameters
September 2008 - June 2013
St Petersburg University
Field of study
  • Internet portal prototype for scientific e-journal release edition: editor and reviewer role automation

Publications

Publications (48)
Article
The aim of the study is to develop a questionnaire integrating traditional career guidance techniques and categorization of IT professions by analyzing existing classifications and interviewing IT specialists. Methods. In order to achieve the objective, we selected a traditional career guidance methodology by analysing the existing ones and selecti...
Article
Full-text available
Online social media has an increasing influence on people’s lives, providing tools for communication and self–representation. People’s digital traces are gaining attention as a reflection of their personality traits, enhancing the personality computing tasks in various areas. This study aims at the identification of statistical associations between...
Chapter
The paper discusses the lack of automated systems that provide personalized career advice without the need for traditional career guidance tests or counselling sessions. It suggests analysing social media data, specifically the topics of the user subscriptions, could be used to generate personalized career recommendations. The article proposes the...
Chapter
Digital traces of the social media users acquire a lot of attention nowadays as they may serve as predictors for various personality traits. The paper refers to the analysis of graphical digital traces, expressed by the user avatars, and aims at quantification of the relationship between its color and semantic characteristics and user’s psychologic...
Chapter
Full-text available
The problem solved in this article is to predict the expression of personality traits of a user, which can be obtained from the Life Style Index questionnaire, through the analysis of the graphical content published in his social media account. The proposed approach is to identify faces in photos from users’ accounts and use them to assess the expr...
Article
Full-text available
We investigated the possibility of automating the prediction of the 16-factor personality traits by R. Cattell from text posts of social media users. The proposed new method of automating the evaluation of R. Kettell’s 16-factor personality test traits includes language models and neural networks. Implementation of the method involves several steps...
Article
Full-text available
In the field of recruitment and human resources management, the problem arises of automatization of the assessment process of the characteristics of human capital, taking into account, among other things, the personality characteristics of the employee. The article is devoted to the problem of identification of such characteristics that have the gr...
Chapter
The subject of the research is the predictors of the intensity of interaction between users in online social networks, which can be formalized in probability estimate of the spread of multistep social engineering attacks. The research methodology is based on comparing, using the methods of statistical analysis, the observed online interaction of us...
Chapter
The task of user accounts matching in different social media and determining those belonging to the same user is relevant in various contexts related to the analysis of social media. The solution of this problem is of both theoretical importance and allows you to expand the understanding of the behavior of users in social media, as well as practica...
Article
Full-text available
A sharp deterioration of the patient’s condition against the backdrop of the development of life-threatening arrhythmias with symptoms of acute heart failure (AHF), multiple organ dysfunction syndrome (MODS) or cerebral edema (CE) can lead to the death of the patient. Since the known methods of automated diagnostics currently cannot accurately and...
Chapter
This paper presents the results of automating the process of social network posts’ two-level hierarchical (ensemble) classification. The research aims to build a second-level model that allows to classify three main classes into subclasses using methods of multi-class classification (SVM, naive Bayesian classifier, random forest and multilayer perc...
Chapter
Full-text available
Multistep social engineering attacks (that involve a chain of users) are a serious threat to an organization’s information security. Usually such attacks require an integrated approach to reduce the probability of their success. This approach can be analysis of the social graph with modeling of scenarios for the spread of multistep social engineeri...
Article
Full-text available
The article proposes a new approach to comparing accounts of the social media “VKontakte” and “Instagram” to determine those accounts which belong to the same user. The approach is based on the comparison of graphic content; the novelty of the approach consists in combining several methods for matching graphic content, also for the first time a met...
Article
Full-text available
The purpose of this study is to study the modernization of the model of an attacker’s social engineering attack on a user, taking into account a wider range of factors influencing the success of a social engineering attack associated with the principles of social influence. Methods . To achieve this goal, the approaches to social influence and the...
Chapter
Algebraic Bayesian networks and Bayesian belief networks are one of the probabilistic graphical models. One of the main tasks which need to be solved during the networks’ handling is the model structure training. This paper is dedicated to the automation of this process for algebraic Bayesian networks. This work relates to the PC-algorithm for alge...
Article
Full-text available
The study presents a new approach to the identification of various online social networks’ users that allows for matching of accounts belonging to the same person. To achieve this goal, images extracted from digital footprints of users are used. The proposed new approach compares not only the main images of a user’s profile, but also all the elemen...
Chapter
Full-text available
The purpose of this study is to propose approaches to validation of quantification of variable “relationship between users” in the context of social engineering attacks, as well as consideration of the accuracy of the proposed model, correlativity checks of used in research formulations and desired characteristics and other conditions necessary for...
Chapter
The article presents an approach to searching for a user’s account on VK.com using data from that user’s account on Odnoklassniki, wich follows the research on the user identification across different social media. This issue is important as, to the author’s knowledge, there are no studies about user search automation for popular Russian social med...
Article
Full-text available
This paper suggests improving the previously existing method of identifying user profiles in different online social networks by adding face recognition results to the model. It is assumed that the method will become more stable for identifying people with the same name, city and age. It will help to find more user profiles in different online soci...
Chapter
Full-text available
This article proposes a mathematical model that helps to track a player’s game actions and present them in a structured form. The gaming process is presented as a set of states that are connected by a player’s actions. Each state is a set of predicates that characterize the player’s knowledge about the game. This mathematical model was developed as...
Article
The article is aimed at summarizing the concepts of a derivative graph and a primitive graph for graphs with backbone connectivity. Theorems are formulated and proved on the main connectedness of the graph of the derivative and on the primitive graph of the main connected graphs. The theoretical and practical significance of the result is to simpli...
Chapter
Full-text available
In this research we present the hybrid model of finding the most critical distribution trajectories of multipath Social engineering attacks, passing through which by the malefactor on a global basis has the topmost degree of probability and will bring the greatest loss to the company. The solution of search problem concerning the most critical traj...
Article
Full-text available
The article is aimed at generalizing the concepts of a derivative graph and a primitive graph for graphs with trunk connectivity. Theorems are formulated and proved on the main connectedness of the graph of the derivative and on the graph of the antiderivative main connected graphs. The theoretical and practical significance lies in the study of st...
Chapter
Full-text available
The purpose of this article is to propose an approach to denoting the parameters of the model for assessing the probability of success of a multi-pass social engineering attack of an attacker on a user. These parameters characterize the evaluation of the probability of propagation of social engineering attacks from user to user in one type of inter...
Article
The article is aimed at demonstrating the practical application of graph theory as a subsection of the theoretical foundations of computer science in solving one of the interdisciplinary problems — describing the structure of the cadmium sulfide molecule using methods and indices of chemoinformatics. The article presents the results of calculations...
Chapter
Full-text available
The material is devoted to solving an individual task of the research aimed at automating the construction of estimates of protection of users and, indirectly, critical documents from social engineering attacks. This issue is closely related to soft social computing. Also the estimates of protection of users are the basis of building a expert syste...
Article
Full-text available
The article describes the approach to solving the problem of comparing user profiles of different social networks and identifying those that belong to one person. An appropriate method is proposed based on a comparison of the social environment and the values of account profile attributes in two different social networks. The results of applying va...
Article
Full-text available
The purpose of this study is to study the impact of possible types of relationships between users, which are represented in the social network “VKontakte”, on the probability of the spread of a social engineering attack.Methods. To achieve this goal, a survey was developed and a web page was created, which is used to collect responses from responde...
Chapter
Full-text available
In this article we propose to consider the trajectories of social engineering attacks, which are the most critical from the point of view of the expected damage to the organization, and not from the point of view of the probability of success of the defeat of the user and, indirectly, critical documents to which he has access. The article proposes...
Article
Full-text available
Introduction: Social engineering attacks can be divided into two types: direct (one-way) and multi-pass ones, passing through a chain of users. Normally, there are several propagation paths for a multi-pass social engineering attack between two users. Estimates of the probabilities of an attack to spread along different trajectories will differ. Pu...
Article
В статье описывается студенческий исследовательский проект по предсказанию класса поста в социальной сети на основе его текстового содержания. Обсуждаются особенности проекта как составной части траектории обучения методам анализа данных, в том числе методам и инструментам анализа текста, часто не включаемым в курсы по машинному обучению. Описана п...
Chapter
Questions of information security for today’s business, somehow using information technologies are among the most important. Probabilistic relational model complex “information system—critical documents—the staff—the attacker” are being concidered, as well as an algorithm for estimating the probability of users of information systems security by so...
Conference Paper
Full-text available
The problem of forecasting protests on digital footprints of social media users is still unsolved, and there are no scientific articles on the issue. This paper is devoted to estimating the possibility of such forecasting and to pointing out potential difficulties and limitations associated with this study. We use a comparative analysis of this pro...

Network

Cited By