Follow
Dmitry Chalyy
Dmitry Chalyy
P.G. Demidov Yaroslavl State University
Verified email at uniyar.ac.ru
Title
Cited by
Cited by
Year
Performance analysis of trickles and TCP transport protocols under high-load network conditions
MA Nikitinskiy, DJ Chalyy
Automatic Control and Computer Sciences 47 (7), 359-365, 2013
202013
An extensible coloured Petri net model of a transport protocol for packet switched networks
DJ Chaly, VA Sokolov
International Conference on Parallel Computing Technologies, 66-75, 2003
112003
Decidability of boundedness problems for Minsky counter machines
EV Kuzmin, DJ Chalyy
Automatic Control and Computer Sciences 44 (7), 387-397, 2010
72010
A Simple Information Flow Security Model for Software-Defined Networks
D Chalyy, E Nikitin, E Antoshina
Proceedings of the 17th Conference of Open Innovations Association FRUCT …, 2015
62015
Automaton counter machines
EV Kuzmin, VA Sokolov, DJ Chaly
Proc. of Int. Workshop on Program Understanding (sat. of PSI’09), 1-4, 2009
62009
On some approaches to the solution of the problem «Useful Proof-of-work for blockchains»
VG Durnev, DM Murin, VA Sokolov, DY Chalyi
Modelirovanie i Analiz Informatsionnykh Sistem 25 (4), 402-410, 2018
52018
Design and security analysis of a fragment of Internet of Things telecommunication system
VA Alexandrov, VA Desnitsky, DY Chaly
Modelirovanie i Analiz Informacionnyh Sistem 23 (6), 767-776, 2016
52016
On Some Approaches to the Solution of the “Useful Proof-of-Work for Blockchains” Task
VG Durnev, DM Murin, VA Sokolov, DJ Chalyy
Automatic Control and Computer Sciences 52 (7), 880-884, 2018
42018
End-to-end information flow security model for software-defined networks
DY Chalyi, ES Nikitin, EY Antoshina, VA Sokolov
Моделирование и анализ информационных систем 22 (6), 735-749, 2015
42015
A translator with a security static analysis feature of an information flow for a simple programming language
EJ Antoshina, AN Barakova, ES Nikitin, DJ Chalyy
Automatic Control and Computer Sciences 48 (7), 589-593, 2014
42014
On the decidability of boundedness problems for counter Minsky machines
EV Kuz'min, DY Chalyi
Modelirovanie i Analiz Informatsionnykh Sistem 15 (1), 16-26, 2008
42008
On the reachability set of automaton counter machines
EV Kuzmin, DJ Chalyy
Automatic Control and Computer Sciences 45 (7), 444-451, 2011
32011
On a class of counter machines
EV Kuz'min, DY Chalyi
Modelirovanie i Analiz Informatsionnykh Sistem 16 (2), 75-82, 2009
32009
Building a Security Policy Tree for SDN Controllers1This work is partially supported by RFBR under the grants 17-07-00823-a and 16-07-01103a.
S Morzhov, V Sokolov, M Nikitinskiv, D Chaly
2018 International Scientific and Technical Conference Modern Computer …, 2018
22018
Boundedness problems for Minsky counter machines
EV Kuzmin, VA Sokolov, DY Chalyy
Programming and Computer Software 36 (1), 3-10, 2010
12010
On a reachability set of automaton 3-counter machines
EV Kuz'min, DY Chalyi
Modelirovanie i Analiz Informatsionnykh Sistem 16 (3), 77-84, 2009
12009
Boundedness problems for Minsky counter machines
EV Kuzmin, VA Sokolov, DY Chaly
Doklady Mathematics 78 (1), 604-606, 2008
12008
The Boundedness Problems of Counter Minsky Machines
EV Kuzmin, VA Sokolov, DY Chalyy
Doklady Academii Nauk 421 (6), 741-743, 2008
12008
A Security System Event Log Analysis
DJ Chalyy, NI Ovchenkov, EG Lazareva, RR Yaikov
1*
Semantic Security Tools in Software-Defined Networks
EJ Antoshina, DJ Chalyy
Automatic Control and Computer Sciences 52 (7), 605-607, 2018
2018
The system can't perform the operation now. Try again later.
Articles 1–20