Anna Epishkina
Articles
Covert channel limitation via special dummy traffic generating
Algorithm for Optimal and Complete Testing of Software and Hardware Data Security Tools
A Technique to Limit Hybrid Covert Channel Capacity via Random Increasing of Packets’ Lengthss
Traffic Normalization for Covert Channel Protecting
New Approach in the Rainbow Tables Method for Human-Like Passwords
Practical User and Entity Behavior Analytics Methods for Fraud Detection Systems in Online Banking: A Survey
Data Augmentation for Signature Images in Online Verification Systems
Online Handwritten Signature Verification: The State of the Art
Comprehensive Testing of Software and Hardware Data Security Tools Using Virtualization
Mobile User Authentication Using Keystroke Dynamics
Continuous Authentication of Smartphone Users via Swipes and Taps Analysis
Timing Covert Channels Detection Cases via Machine Learning
Authentication Protocols Based on One-Time Passwords
A Technique to Test Non-Binary Random Number Generator
Discovering and Clustering Hidden Time Patterns in Blockchain Ledger
Handwritten signature attributes for its verification
Dummy traffic generation to limit timing covert channels
On Attribute-Based Encryption for Access Control to Multidimensional Data Structures
One-Time Passwords: Resistance to Masquerade Attack
Research of homomorphic encryption algorithms over integers
Fully homomorphic encryption schemes: The state of the art
Review of covert channels over HTTP: Communication and countermeasures
Random Delays to Limit Timing Covert Channel
Packet Length Covert Channel Capacity Estimation
A syllabus on data mining and machine learning with applications to cybersecurity
A course of Mathematical Logic and Theory of Algorithms as a mathematical background of modern cryptology
Random delays to limit on/off covert channel
Quantum random number generator for secure communications
Special digital signature schemes based on GOST R 34.10-2012
Secure one-way data transfer
A random traffic padding to limit packet size covert channels
A Traffic Padding to Limit Packet Size Covert Channels
Covert Channels Parameters Evaluation Using the Information Theory Statements
The Capacity of Undetectable On/Off Covert Channel