Victor Skormin Conferences

  • A. Dolgikh, T. Nykodym, V. Skormin, and Z. Birnbaum, "Using Behavioral Modeling And Customized Normalcy Profiles As Protection Against Targeted Cyber-Attacks," Proceedings MMM-ACNS October 17, 2012, St. Petersburg, Russia.
  • V. Skormin, T. Nykodym, A. Dolgikh, J. Antonakos, "Customized Normalcy Profiles for the Detection of Targeted Attacks," EvoStar'12, Computational Intelligence for Risk Management, Security and Defense Applications, Malaga, Spain, April 2012
  • A. Dolgikh, T. Nykodym, V. Skormin, J. Antonakos, "Colored Petri Nets as the Enabling Technology in Intrusion Detection Systems," Proceedings MILCOM'11, Baltimore MD, November 2011
  • A. Dolgikh, T. Nykodym, V. Skormin, J. Antonakos, "Computer Network Testbed at Binghamton University," Proceedings MILCOM'11, Baltimore MD, November 2011
  • T. Nykodym, A. Dolgikh, V. Skormin, J. Antonakos, "Automatic Functionality Detection in Behavior-Based IDS," Proceedings MILCOM'11, Baltimore MD, November 2011
  • A. Tokhtabayev, V. Skormin and A Dolgikh, “Dynamic, Resilient Detection of Complex Malicious Functionalities in the System Call Domain”, Proceedings MILCOM'10, October 2010, San Jose, CA.
  • A. Tokhtabayev, V. Skormin and A. Dolgikh, “Expressive, Efficient and Obfuscation Resilient Behavior Based IDS," Proc. European Symposium on Research in Computer Security, ESORICS 2010, September 2010 Athens, Greece
  • A. Tokhtabayev, V. Skormin, A. Dolgikh “Behavioral Obfuscation in Malware and its Mitigation via Signature Generalization”, Proceedings International Conference on Security and Management, SAM’10, Las Vegas, NV 2010
  • A. Tokhtabayev, V. Skormin, A. Dolgikh, “Detection of Specific Semantic Functionalities, Such as Self-Replication Mechanism, in Malware Using Colored Petri Nets” 2009 International Conference on Security and Management (SAM'09: July 13-16, USA)
  • A. Tokhtabayev, V. A. Skormin and A. M. Dolgikh, "Detection of Worm Propagation Engines in the System Call Domain using Colored Petri Nets", Proc. 27th IEEE International Performance Computing and Communications Conference (IPCCC), Austin, TX, Dec. 2008
  • A. Tokhtabayev and V. Skormin, "Non-Stationary Markov Models and Anomaly Propagation Analysis in IDS”, Proc. IAS’07, Manchester, England, August 2007.
  • Volynkin and V. Skormin, "Large-scale Reconfigurable Virtual Testbed for Information Security Experiments,"Proc. 3rd International Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities, Orlando, FL, May 21-23, 2007.
  • Tokhtabayev, S. Mazur, O. Shiryayeva, and V. Skormin, "Continuous Status Assessment of a Computer Network by Selective Scanning," presented at the Information Assurance Science & Technology Series, Cyber Defense Conference, Rome, NY, May 22-24, 2007.
  • V. Skormin, O. Shiryayeva, A. Tokhtabayev, and J. Moronski, "Towards a Fully Automatic Defense Mechanism for a Computer Network Emulating Active Immune Response," Proc. MMM-ACNS Sept. 20, 2007, St. Petersburg, Russia.
  • Tokhtabayev, A. Altaibek, V. Skormin, and U. Tukeyev, "A Novel Intrusion Detection System for a Local Computer Network" Proc. of MMM-ACNS , Sept. 20, 2007 St. Petersburg,Russia.
  • V. Skormin, M. Pechoucek, T. Busch, "Multi-Agent System for Airspace Control in the Combat Zone", Proceedings of the 18th International Conference on Systems Research, Informatics and Cybernetics, Advances in Intelligent Software systems, Baden-Baden, Germany, August 8, 2006
  • A. Volynkin, V. Skormin, D. Summerville, J. Moronski, "Evaluation of Run-Time Detection of Self-Replication in Binary Executable Malware," 7th Annual IEEE Information Assurance Workshop, West Point, NY, June 6, 2006, Winner of the Best Paper Award
  • V. Skormin, A. Volynkin, D. Summerville, J. Moronski, "Prevention of Information Attacks by Run-Time Detection of Self-Replication in Computer Codes," 3rd International Workshop MMMANCS 2005, St. Petersburg , Russia , September 24-28, 2005.
  • V. Skormin, A. Volynkin, D. Summerville, J. Moronski, "In Search of the ‘Gene of Self-Replication’ in Malicious Codes," Proc. 6th IEEE Information Assurance Workshop, Westpoint ,New York , June 2005.
  • V. Skormin, D. Summerville, O. Shiryayeva, J. Moronski, "Analysis of Active Response in the Immune System with Computer Network Considerations," 16th International Conference on Systems Research, Informatics, and Cybernetics (InterSym2004), Baden-Baden, Germany, July 2004, pp. 15-28.
  • V. Skormin, D. Summerville, J. Moronski, J. Sidoran, "Application of Genetic Optimization and Statistical Analysis for Detecting Attacks on a Computer Network," Proc. of the Real-Time Intrusion Detection NATO Symposium, Lisbon , Portugal , May 27-29, 2002.
  • V. Skormin, V. Nikulin, "Internet Accessbile Laboratory: A Way to Enhance Technical Personnel Training," NATO Community-Army-Technology-Environment Conference Proceedings, Brno ,Czech Republic , May 9-11, 2001.
  • V. Gorodetski, I. Kotenko, V. Skormin, L. Popyack, "Ontology-Based Multi-Agent Model of Information Security Systems", Proc. 7th International Workshop RSFDGRC 1999, Yamaguchi ,Japan , November 9-11, 1999.
  • V. Gorodetski, I. Kotenko, V. Skormin, L. Popyack, "Agent-Based Models of Information Security Systems: Architecture and Framework for Behavior Coordination", Proc. 1st International Workshop of Central and astern Europe on Multi-Agent Systems, St. Petersburg ,Russia , June 1-4, 1999: pp. 113-123
  • Victor Skormin Journals

  • A. Tokhtabayev, V. Skormin, A. Dolgikh, "Obfuscation Resilient Behavior Based IDS based on Colored Petri Nets, " Journal of Computer Security, under review
  • A. Tokhtabayev and V. Skormin, "Increasing Confidence of IDS through Anomaly Propagation Analysis", Journal of Information Assurance and Security, Vol. 2, Issue 2, pp. 107-116, June 2007
  • V. Skormin, A. Volynkin, D. Summerville, J. Moronski, "Prevention of Information Attacks by Run-Time Detection of Self-Replication in Computer Codes," Computer Security Journal, Volume 15, No. 2, pp. 273 - 301.
  • V. Skormin, J. Moronski, D. McGee, D. Summerville, "Biological Approach to System Information Security (BASIS): A Multi-Agent Approach to Information Security," Lecture Notes in Computer Science 2691 (2003): 435-444.
  • V. Skormin, D. Summerville, J. Moronski, D. McGee, "Detecting Malicious Codes by the Presence of their Gene of Self-Replication," Lecture Notes in Computer Science 2776 (2003): 195-205.
  • V. Skormin, V. Gorodetski, L. Popyack, "Data Mining Technology for Failure Prognostics of Avionics," IEEE Trans. On Aerospace and Electronic Systems 38, no. 2 (Apr 2002): 388-402.
  • V. Skormin, et al., "BASIS: A Biological Approach to System Information Security," Lecture Notes for Computer Science (2001) 2052: pp. 127-142.
  • Victor Skormin Books

  • I. Kotenko, V. A. Skormin (Eds.): Computer Network Security, 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012 Proceedings. Lecture Notes in Computer Science 7531 Springer 2012, ISBN 978-3-642-33703-1
  • I. Kotenko, V. A. Skormin (Eds.): Computer Network Security, 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2010 Proceedings. Lecture Notes in Computer Science 6258 Springer 2010, ISBN 978-3-642-14705-0
  • V. Skormin, Advanced Process Control: Analysis, Modeling, Control and Optimization, 350 pages, Completed manuscript is being submitted to Springer NY
  • V. Gorodetsky, Chenghi Zhang, V. Skormin, L. Cao (Eds.), Autonomous Intelligent Systems: Agents and Data Mining, Second International Workshop, AIS-ADM 2007, Proceedings, Springer, 2007
  • V. Gorodetsky, I. Kotenko, V. Skormin (Eds.), Computer Network Security, Fourth International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, Proceedings, Springer, 2007
  • V. Gorodetski, J. Liu, V. Skormin (eds.), Autonomous Intelligent Systems: Agents and Data Mining: International Workshop AIS-ADM 2005, Lecture Notes in Artificial Intelligence, Vol. 3505, New York : Springer, 2005.
  • V. Gorodetski, I. Kotenko, V. Skormin (eds.), Computer Network Security: Third International Workshop MMM-ACNS 2005, St. Petersburg, Russia, September 24-28, 2005, Lecture Notes in Computer Science, Vol. 3658, New York: Springer, 2005.
  • V. Gorodetski, L. Popyack, V. Skormin (eds.), Computer Network Security: Second International Workshop MMM-ACNS 2003, St. Petersburg , Russia , September 21-13, 2003, Lecture Notes in Computer Science, Vol. 2776, New York : Springer, 2003.
  • A. Tarakanov, V. Skormin, S. Sokolova, Immunocomputing: Principles and Applications, New York, Springer-Verlag, 2003.
  • V. Gorodetski, V. Skormin, L. Popyack (eds.), Information Assurance in Computer Networks: International Workshop MMM-ACNS 2001, St. Petersburg, Russia, May 21-23, 2001, Lecture Notes in Computer Science, Vol. 2052, New York: Springer, 2001.