Stanislav Ponomarev

Learn More
As the technologies used for the safe and efficient delivery of power become more sophisticated, the amount of system state parameters being recorded increases. This data not only provides an opportunity for monitoring and diagnostics of the power system but also creates an environment wherein security can be maintained. Being able to extract relevant(More)
Modern networking architecture is designed with high scalability in mind. Different protocols can be encapsulated to support different systems. Machine identifiers (IP and MAC addresses) in network packets can be modified easily. This modification prevents servers from determining whether the connecting machines are allowed to communicate. Cryptographic(More)
—Securing the critical infrastructure power grid is one of the biggest challenges in securing cyberspace. In this environment , control devices are spread across large geographic distances and utilize several mediums for communication. Given the required network topology of the power grid several entry points may exist that can be utilized for compromising(More)
—Research efforts to develop malicious application detection algorithms have been a priority ever since the discovery of the first " viruses ". Various methods are used to search and identify these malicious applications. One such method, n-gram analysis, can be implemented to extract features from binary files. These features are then be used by machine(More)
The histological study of the adult specimens of walleye pollock Theragra chalcogramma carrying filamentous gonads evidenced that this group comprised males, females, and sterile fish. The specimens carrying the filamentous gonads have been found mostly in the elder age groups; no maturing of the oocytes or sperm cells has been registered. The frequency of(More)
The data on the stock assessment and structure of the walleye pollock population in the northern Sea of Okhotsk are based on trawl and ichthyoplankton surveys in April and May of 2013. As compared to the assessment of 2012, the total abundance of walleye pollock decreased by 1.8 times and its biomass decreased by 1.4 times. The low number of(More)
—Research efforts to develop malicious application detection algorithms have been a priority ever since the discovery of the first " viruses ". Fourier transform is used to extract features from binary files. These features are then reduced by random projection algorithm to create a set of low-dimensional features that are used to classify whether the(More)
Signature based anti-virus systems inherently restrict the detection of new and previously unknown types of malicious attacks. To that end researchers are searching for methodologies to combat this problem. One potential method is the use of static application analysis. Using this methodology the applications are not executed to determine whether or not(More)
  • 1