Research

Our talks:





Our publications:
  1. A security model of individual cyberspace / А. Adamov, V. Hahanov // Proc. of IEEE EWDTS, September 19–20, 2011. – Sevastopol, 2011. – P. 169–172. 
  2. Analysis and Detection of Polymorphic Spyware / Adamov A, Saprykin A // Hakin9 Magazine, Vol.8 № 01, Issue 01/2013 (61), ISSN: 1733-7186 – P. 6-11. 
  3. Discovering New Indicators for Botnet Traffic Detection / A. Adamov, V. Hahanov, A. Carlsson // Proc. of IEEE EWDTS, September 26–29, 2014, Kiev, Ukraine. – Kiev, 2014. – P. 281–285. 
  4. Method of attribute-based URL recognition using frequency patterns / A.S. Adamov, V.I. Hahanov // Bulletin of the State Engineering University of Armenia, Yerevan, 2014, Issue 17, No. 2, C. 59-66 (UDC 681.326: 519.713). 
  5. Structures for information retrieval in big data / Hahanov V, Chumachenko S, Litvinova E, Adamov A et al // Proc. of 13th International Conference Experience of Designing and Application of CADSM (CADSM'2015), Lviv, Ukraine, 2015 – P. 70-75. 
  6. A Sandboxing Method to Protect Cloud Cyberspace / Adamov A, Carlsson A // Proceedings of IEEE EWDTS, September 27-30, 2015, Batumi, Georgia – P. 180–183. 
  7. Android Ransomware: Turning CryptoLocker into CryptoUnlocker / Adamov A // Proc. of the 25th Virus Bulletin International Conference, Prague, Czech Republic, 30 Sep-2 Oct 2015 – P. 220-223. 
  8. Detecting targeted attacks in the cloud / Adamov A // OpenStack Summit, Vancouver, Canada, 18-22 May 2015. 
  9. Using Open Source Security Architecture to Defend against Targeted Attacks / Alexander Adamov, Dan Lambright // OpenStack Summit, Austin, TX, US, April 25-29, 2016. 
  10. Cloud incident response model / Alexander Adamov, Anders Carlsson // IEEE EWDTS, October 14–17, 2016, Yerevan, Armenia. – P. 250–253 
  11. The State of Ransomware. Trends and Mitigation Techniques / Alexander Adamov, Anders Carlsson // Proc. of IEEE East-West Design & Test Symposium (EWDTS’2017), Sep 29 – Oct 2, 2017, Belgrad, Serbia. – P. 121–128. 
  12. Adamov A, Carlsson A, Battlefield Ukraine: finding patterns behind summer cyber attacks, // Proc. of the 27th Virus Bulletin International Conference, Madrid, Spain, 4-6 Oct 2017 – Appendix Last-minute presentations P. 4-5. 
  13. Adamov A, Artificial intelligence to assist with ransomware cryptanalysis, // Proc. of the 28th Virus Bulletin International Conference, Montreal, Canada, 3-5 Oct 2018.
  14. A. Carlsson, I. Sokolianska, A. Adamov, Educating the Next Generation MSc in Cyber Security, ISBN: 978-91-7295-963-7, 2018, BTH, Sweden. –  p. 205.
  15. A. Adamov, Education Challenges and Development of Advanced Malware Analysis Course, Educating the Next Generation MSc in Cyber Security: Articles, ISBN: 978-91-7295-963-7, 2018, BTH, Sweden. –  P. 130-133.
  16. A. Carlsson, A. Adamov, The Cloud Threat Landscape, Educating the Next Generation MSc in Cyber Security: Articles, ISBN: 978-91-7295-963-7, 2018, BTH, Sweden. –  P. 182-186.
  17. A. Adamov and A. Carlsson, "Reinforcement Learning for Anti-Ransomware Testing," 2020 IEEE EWDTS 2020, doi: 10.1109/EWDTS50664.2020.9225141.(link)