Stanislav Ponomarev

Learn More
As the technologies used for the safe and efficient delivery of power become more sophisticated, the amount of system state parameters being recorded increases. This data not only provides an opportunity for monitoring and diagnostics of the power system but also creates an environment wherein security can be maintained. Being able to extract relevant(More)
Modern networking architecture is designed with high scalability in mind. Different protocols can be encapsulated to support different systems. Machine identifiers (IP and MAC addresses) in network packets can be modified easily. This modification prevents servers from determining whether the connecting machines are allowed to communicate. Cryptographic(More)
Until recently, industrial control systems (ICSs) used “air-gap” security measures, where every node of the ICS network was isolated from other networks, including the Internet, by a physical disconnect. Attaching ICS networks to the Internet benefits companies and engineers who use them. However, as these systems were designed for use in the(More)
—Securing the critical infrastructure power grid is one of the biggest challenges in securing cyberspace. In this environment , control devices are spread across large geographic distances and utilize several mediums for communication. Given the required network topology of the power grid several entry points may exist that can be utilized for compromising(More)
Research efforts to develop malicious application detection algorithms have been a priority ever since the discovery of the first "viruses". Various methods are used to search and identify these malicious applications. One such method, n-gram analysis, can be implemented to extract features from binary files. These features are then be used by machine(More)
The histological study of the adult specimens of walleye pollock Theragra chalcogramma carrying filamentous gonads evidenced that this group comprised males, females, and sterile fish. The specimens carrying the filamentous gonads have been found mostly in the elder age groups; no maturing of the oocytes or sperm cells has been registered. The frequency of(More)
The use and deployment of Industrial Control Systems (ICS) have become standard across many industries, though the security of these important systems have not kept pace with their current Internet focused deployment technologies. This technology gap has exposed an exploitable vector for would be attackers as ICS protocols do not have security mechanisms in(More)
—Research efforts to develop malicious application detection algorithms have been a priority ever since the discovery of the first " viruses ". Fourier transform is used to extract features from binary files. These features are then reduced by random projection algorithm to create a set of low-dimensional features that are used to classify whether the(More)
The data on the stock assessment and structure of the walleye pollock population in the northern Sea of Okhotsk are based on trawl and ichthyoplankton surveys in April and May of 2013. As compared to the assessment of 2012, the total abundance of walleye pollock decreased by 1.8 times and its biomass decreased by 1.4 times. The low number of(More)
Signature based anti-virus systems inherently restrict the detection of new and previously unknown types of malicious attacks. To that end researchers are searching for methodologies to combat this problem. One potential method is the use of static application analysis. Using this methodology the applications are not executed to determine whether or not(More)
  • 1