scispace - formally typeset
R

Roman Demidov

Researcher at Saint Petersburg State Polytechnic University

Publications -  10
Citations -  65

Roman Demidov is an academic researcher from Saint Petersburg State Polytechnic University. The author has contributed to research in topics: Artificial neural network & Deep learning. The author has an hindex of 4, co-authored 10 publications receiving 52 citations.

Papers
More filters
Journal ArticleDOI

Threat Analysis of Cyber Security in Wireless Adhoc Networks Using Hybrid Neural Network Model

TL;DR: A hybrid neural network based on recurrent and graph convolutional neural networks is proposed as a solution architecture for analysis of cybersecurity threats in wireless ad hoc networks.
Journal ArticleDOI

Application Model of Modern Artificial Neural Network Methods for the Analysis of Information Systems Security

TL;DR: In this work, the representation of security violation as a property of the system described by a complex function is proposed, in which the method of finding violations is described in the form of approximation of that function and the calculation of its values for specific systems.
Journal ArticleDOI

Hybrid Neural Network Model for Protection of Dynamic Cyber Infrastructure

TL;DR: The proposed neural model demonstrates an universal approach that deals with the cybersecurity weakness as a systems genuine property and attempts to approximate it using a hybrid deep ANN, which detects both the network security defects and binary code vulnerabilities at once with high accuracy.
Proceedings ArticleDOI

Applying Deep Learning and Vector Representation for Software Vulnerabilities Detection

TL;DR: This work concentrates on improvement of neural network-based approach described in previous works of authors to include the morphology of instructions in vector representations to improve the vulnerability detecting accuracy.
Proceedings ArticleDOI

Integer overflow vulnerabilities detection in software binary code

TL;DR: A new approach to detect integer overflow vulnerabilities in executable x86-architecture code is proposed, based on symbolic execution of the code and the dual representation of memory.