Поступила: 06.07.2024
Принята к публикации: 26.07.2024
Ключевые слова: машинное обучение, компьютерная безопасность, поведенческая биометрия, анализ социальных сетей, UEBA-системы
DOI: 10.55959/MSU/0137-0782-15-2024-47-4-160-189
Машечкин И.В., Петровский М.И., Казачук М.А. Методы машинного обучения для анализа и моделирования поведения пользователей компьютерных систем // Вестник Московского университета. Серия 15. Вычислительная математика и кибернетика. 2024. № 4. С. 160-189 https://doi.org/10.55959/MSU/0137-0782-15-2024-47-4-160-189.

В данной статье дается обзор современного состояния и основных научных результатов коллектива кафедры интеллектуальных информационных технологий факультета вычислительной математики и кибернетики МГУ им. М.В. Ломоносова в области исследования и разработки методов машинного обучения для решения задач анализа и моделирования поведения пользователей компьютерных систем рассматриваются модели и задачи для основных источников поведенческих данных, включая человеко-машинный интерфейс, прикладные и системные журналы, электронные документы и взаимодействующие группы и сообщества пользователей, а также комбинации этих источников. Основной акцент делается на решении задач, связанных с компьютерной и информационной безопасностью.
Bicakci K. et al. Analysis and evaluation of keystroke dynamics as a feature of contextual authentication // 2020 International Conference on Information Security and Cryptology (ISCTURKEY). IEEE, 2020. P. 11-17.
Kochegurova E.A., Zateev R.P. Hidden monitoring based on keystroke dynamics in online examination system // Programming and Computer Software. 2022. 48. N 6. P. 385–398.
Kiyani A.T. et al. Continuous user authentication featuring keystroke dynamics based on robust recurrent confidence model and ensemble learning approach // IEEE Access. 2020. 8. P. 156177-156189.
Maharjan P. et al. Keystroke dynamics based hybrid nanogenerators for biometric authentication and identification using artificial intelligence // Advanced Science. 2021. 8. N 15. P. 2100711.
Aversano L. et al. Continuous authentication using deep neural networks ensemble on keystroke dynamics // PeerJ Computer Science. 2021. 7. P. e525.
Li J., Chang H.C., Stamp M. Free-text keystroke dynamics for user authentication // Artificial Intelligence for Cybersecurity. Cham: Springer International Publishing, 2022. P 357-380.
Martin A.G. et al. Combining user behavioural information at the feature level to enhance continuous authentication systems // Knowledge-Based Systems. 2022. 244. P. 108544.
Raul N., Shankarmani R., Joshi P. A comprehensive review of keystroke dynamics-based authentication mechanism // International Conference on Innovative Computing and Communications: Proceedings of ICICC 2019. Vol. 2. Springer Singapore, 2020. P. 149-162.
Xiaofeng L., Shengfei Z., Shengwei Y. Continuous authentication by free-text keystroke based on CNN plus RNN // Procedia Computer Science. 2019. 147. P. 314-318.
Ayotte B. et al. Fast continuous user authentication using distance metric fusion of free-text keystroke data// Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops. IEEE, 2019. P. 1-9.
Quraishi S.J., Bedi SS. On keystrokes as continuous user biometric authentication // International Journal of Engineering and Advanced Technology. 2019. 8. N 6. P. 4149-4153.
Hazratifard M., Gebali F., Mamun M. Using machine learning for dynamic authentication in telehealth: A tutorial // Sensors, 2022. 22. N 19. P. 7655.
Sadikan S.F.N., Ramli A.A., Fudzee M.F.M. A survey paper on keystroke dynamics authentication for current applications // AIP Conference Proceedings. 2019. 2173. N 1. P. 1-11.
Shadman R. et al. Keystroke dynamics: concepts, techniques, and applications // arXiv preprint arXiv:2303.04605. 2023.
Acien A. et al. TypeNet: Deep learning keystroke biometrics // IEEE Transactions on Biometrics, Behavior, and Identity Science. 2021. 4. N 1. P. 57-70.
Roy S. et al. A systematic literature review on latest keystroke dynamics based models // IEEE Access. 2022. 10. P. 92192-92236.
Hu T. et al. An insider threat detection approach based on mouse dynamics and deep learning // Security and Communication Networks. 2019. 2019. N 1. P. 3898951-3898963.
Shen C. et al. Pattern-growth based mining mouse-interaction behavior for an active user authentication system // IEEE Transactions on Dependable and Secure Computing. 2017. 17. N 2. P. 335–349.
Mo F. et al. Authentication using users' mouse behavior in uncontrolled surroundings // 5th International Conference on Computing for Sustainable Energy and Environment: Proceedings of ICCSEE 2018. Springer Singapore, 2018, P. 121-132.
Salman O.A., Hameed S.M. Using mouse dynamics for continuous user authentication// Proceedings of the Future Technologies Conference (FTC) 2018. Vol. 1. Springer International Publishing, 2019. P. 776– 787.
Khan A., Quraishi S.J., Bedi S.S. Mouse dynamics as continuous user authentication tool // International Journal of Recent Technology and Engineering (URTE). ISSN, 2019. P. 2277–3878.
Gao L. et al. Continuous authentication of mouse dynamics based on decision level fusion // 2020 International Wireless Communications and Mobile Computing (IWCMC). IEEE, 2020. P. 210-214.
Garabato D. et al. Al-based user authentication reinforcement by continuous extraction of behavioral interaction features // Neural Computing and Applications. 2022. 34. N 14. P. 11691-11705.
Yildirim M., Anarim E. Mitigating insider threat by profiling users based on mouse usage pattern: ensemble learning and frequency domain analysis // International Journal of Information Security, 2022. 21. N 2. P. 239-251.
Khan S., Hou D. Mouse dynamics behavioral biometrics: a survey // arXiv preprint arXiv:2208.09061. 2022.
Antal M., Fejer N., Buza K. SapiMouse: mouse dynamics-based user authentication using deep feature learning // 2021 IEEE 15th International Symposium on Applied Computational Intelligence and Informatics (SACI). IEEE, 2021. P. 61–66.
Khan S., Hou D. User authentication by fusion of mouse dynamics and widget interactions: two experiments with PayPal and Facebook // 2023 IEEE 20th Consumer Communications & Networking Conference (CCNC), IEEE, 2023. P. 248-254.
Wang X. et al. User authentication method based on MKL for keystroke and mouse behavioral feature fusion // Security and Communication Networks. 2020. 2020. N 1. P. 9282380-9282394.
Li B. et al. Wrist in motion: A seamless context-aware continuous authentication framework using your clickings and typings // IEEE Transactions on Biometrics, Behavior, and Identity Science. 2020. 2. N 3. P. 294–307.
Thomas P.A. Active behavioural biometric authentication using cat swarm optimization variants with deep learning. // Indian Journal of Computer Science and Engineering, 2022. 13. N 3. P. 653–668.
Guan J., Li X., Zhang Y. Design and implementation of continuous authentication mechanism based on multimodal fusion mechanism // Security and Communication Networks, 2021. 2021. P. 1–19.
Neha Chatterjee K. Continuous user authentication system: a risk analysis based approach // Wireless Personal Communications. 2019. 108. P. 281-295.
Thomas P.A., Preetha M.K. A broad review on non-intrusive active user authentication in biometrics // Journal of Ambient Intelligence and Humanized Computing. 2023. 14. N 1. P. 339–360.
Araujo L.C.F. et al. User authentication through typing biometrics features // IEEE Transactions on Signal Processing, 2005. 53. N 2. P. 851-855.
Kang P., Cho S. A hybrid novelty score and its use in keystroke dynamics-based user authentication // Pattern Recognition. 2009. 42. N 11. P. 3115-3127.
Lau E. et al. Enhanced user authentication through keystroke biometrics // Computer and Network Security, 2004. 6. P. 1-12.
Teh PS., Teoh A. B. J., Yue S. A survey of keystroke dynamics biometrics // The Scientific World Journal. 2013. 2013. N 1. P. 408280.
Arsh A. et al. Multiple approaches towards authentication using keystroke dynamics // Procedia Computer Science, 2024, 235. P. 2609-2618.
Abd Hamid N. et al. Comparative analysis of classification algorithm to authenticate user based on keystroke technique // Sixteenth International Conference on Correlation Optics. Vol. 12938. SPIE, 2024. P. 294-302.
Piugie Y.B.W. et al. Keystroke dynamics based user authentication using deep leaming neural networks // 2022 International Conference on Cyberworlds (CW). IEEE, 2022. P. 220–227.
Lis K., Niewiadomska-Szynkiewicz E., Dziewulska K. Siamese neural network for keystroke dynamics-based authentication on partial passwords // Sensors. 2023. 23. N 15. P. 6685.
Tsai C.J. et al. An approach for user authentication on non-keyboard devices using mouse click characteristics and statistical-based classification // International Journal of Innovative Computing, Information and Control. 2012. 8. N 11. P. 7875-7886.
Gamboa H., Fred A. A behavioral biometric system based on human-computer interaction // Biometric Technology for Human Identification. International Society for Optics and Photonics. 2004. 5404. P. 381–392.
Bours P., Fullu C.J. A login system using mouse dynamics // 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing. IEEE, 2009. P. 1072-1077.
Traore I. et al. Combining mouse and keystroke dynamics biometrics for risk-based authentication in web environments // 2012 Fourth International Conference on Digital Home. IEEE, 2012. P. 138-145.
Revett K. et al. A survey of user authentication based on mouse dynamics // Global E-Security: 4th International Conference. Proceedings. Berlin; Heidelberg: Springer, 2008. P. 210-219.
A ju for N. et al. Refinement of a mouse movement biometric system // Proceedings of Student-Faculty Research Day. CSIS, Pace University, 2008. P. 1-8.
Feher C. et al. User identity verification via mouse dynamics // Information Sciences. 2012. 201. P. 19-36.
Niewiadomski W. et al. Trac Mouse: a computer aided movement analysis script for the mouse inverted horizontal grid test // Scientific Reports, 2016. 6. N 1. P. 39331.
Raj S.B.E., Santhosh A.T. A behavioral biometric approach based on standardized resolution in mouse dynamics // International Journal of Computer Science and Network Security, 2009. 9. N 4. P. 370-377.
Muthumari G., Shenbagaraj R., Pepsi M.B.B. Authentication of user based on mouse- behavior data using classification // International Journal of Innovative Research in Science, Engineering and Technology. 2014. 3. P. 2319-8753.
Zhang J., Bai R. An intelligent identity authentication method based on mouse trajectory and wireless signal // Digital Signal Processing, 2024. P. 104555.
Houssel P.R.B., Leiva L.A. User re-authentication via mouse movements and recurrent neural networks// Proceedings of the 10th International Conference on Information Systems Security and Privacy. IEEE, 2024. P. 652-659.
Handoko M.S. Unlocking User Identity: A Study on Mouse Dynamics in Dual Gaming Environments for Continuous Authentication. Cornerstone, 2023.
Liu S. et al. Recent advances in biometrics-based user authentication for wearable devices: a contemporary survey// Digital Signal Processing, 2022. 125. P. 103120.
Soh C. et al. Employee profiling via aspect-based sentiment and network for insider threats detection // Expert Systems with Applications. 2019. 135. P. 351-361.
Paul S., Mishra S. LAC: LSTM autoencoder with community for insider threat detection // Proceedings of the 4th International Conference on Big Data Research. IEEE, 2020. P. 71-77.
Le D.C., Zincir Heywood N., Heywood M.I. Analyzing data granularity levels for insider threat detection using machine learning // IEEE Transactions on Network and Service Management. 2020. 17. N 1. P. 30-44.
Yuan F. et al. Insider threat detection with deep neural network // Computational Science-ICCS 2018: 18th International Conference. Part I 18. Springer International Publishing, 2018. P. 43-54.
Al-Mhiqani M.N. et al. New insider threat detection method based on recurrent neural networks // Indones. J. Electr. Eng. Comput. Sci. 2020. 17. N 3. P. 1474-1479.
Kim J. et al. Insider threat detection based on user behavior modeling and anomaly detection algorithms. // Applied Sciences, 2019. 9. N 19. P. 4018.
Noever D. Classifier suites for insider threat detection // arXiv preprint arXiv:1901.10948, 2019.
Saaudi A. et al. Insider threats detection using CNN-LSTM model // 2018 International Conference on Computational Science and Computational Intelligence (CSCI). IEEE, 2018. P. 94-99.
Gayathri R.G., Sajjanhar A., Xiang Y. Image-based feature representation for insider threat classification // Applied Sciences. 2020. 10. N 14. P. 4945.
Aldairi M., Karimi L., Joshi J. A trust aware unsupervised learning approach for insider threat detection // 2019 IEEE 20th International Conference on Information Reuse and Integration for Data Science (IRI). IEEE, 2019. P. 89-98.
Yuan F. et al. Attention-based LSTM for insider threat detection // Applications and Techniques in Information Security: 10th International Conference. ATIS 2019. Proceedings. Singapore: Springer, 2019. P. 192-201.
Chattopadhyay P., Wang L., Tan Y.P. Scenario-based insider threat detection from cyber activities // IEEE Transactions on Computational Social Systems. 2018. 5. N 3. P. 660–675.
Lee J. et al. Cyber threat detection based on artificial neural networks using event profiles // IEEE Access. 2019. 7. P. 165607-165626.
Sheeraz M. et al. Effective security monitoring using efficient SIEM architecture // Hum.-Centric Comput. Inf. Sci. 2023. 13. P. 1-18.
Ban T. et al. Breaking alert fatigue: Al-assisted SIEM framework for effective incident response // Applied Sciences, 2023. 13. N 11. P. 6610.
Gonzalez-Granadillo G., Gonzalez-Zarzosa S., Diaz R. Security information and event management (SIEM): analysis, trends, and usage in critical infrastructures // Sensors. 2021. 21. N 14. P. 4759.
Kotenko I., Fedorchenko A., Doynikova E. Data analytics for security management of complex heterogeneous systems: event correlation and security assessment tasks // Advances in Cyber Security Analytics and Decision Systems. 2020. P. 79-116.
Ndichu S. et al. Al-assisted security alert data analysis with imbalanced learning methods // Applied Sciences, 2023. 13. N 3. P. 1977.
Ban T. et al. Combat security alert fatigue with al-assisted techniques // Cyber Security Experimentation and Test Workshop. 2021. 2021. P. 9–16.
Zhang Y. et al. Dark web forums portal: searching and analyzing jihadist forums // 2009 IEEE International Conference on Intelligence and Security Informatics. IEEE, 2009. P. 71–76.
Abbasi A., Chen H. Applying authorship analysis to extremist-group web forum messages // IEEE Intelligent Systems, 2005, 20. N 5. P. 67-75.
Berger J.M., Morgan J. The ISIS Twitter Census: Defining and describing the population of ISIS supporters on Twitter. Brookings, 2015.
Agarwal S., Sureka A. Applying social media intelligence for predicting and identifying on-line radicalization and civil unrest oriented threats // arXiv preprint arXiv:1511.06858, 2015.
Badia A., Kantardzic M. Link analysis tools for intelligence and counterterrorism // International Conference on Intelligence and Security Informatics. Berlin; Heidelberg: Springer Berlin Heidelberg, 2005. P. 49-59.
Ferrara E. et al. Predicting online extremism, content adopters, and interaction reciprocity // Social Informatics: 8th International Conference. SocInfo 2016. Part II 8. Springer International Publishing, 2016. P. 22-39.
Rios S.A., Munoz R. Dark web portal overlapping community detection based on topic models // Proceedings of the ACM SIGKDD Workshop on Intelligence and Security Informatics. IEEE, 2012. P. 1-7.
Toure I., Gangopadhyay A. Analyzing terror attacks using latent semantic indexing // 2013 IEEE International Conference on Technologies for Homeland Security (HST). IEEE, 2013. P. 334-337.
Scanlon J.R., Gerber M.S. Forecasting violent extremist cyber recruitment // IEEE Transactions on Information Forensics and Security, 2015. 10. N 11. P. 2461-2470.
L'huillier G. et al. Topic-based social network analysis for virtual communities of interests in the dark web // ACM SIGKDD Explorations Newsletter. 2011. 12. N 2. P. 66-73.
Brachman R.J., Levesque H.J. Representation and Reasoning, Elsevier, 2004.
Russell S.J., Norvig P. Artificial Intelligence: a Modern Approach. Pearson, 2016.
Doddington G.R. et al. The automatic content extraction (ace) program-tasks, data, and evaluation // Language Resources and Evaluation. 2004. 2. N 1. P. 837-840.
Codd E.F. A relational model of data for large shared data banks // Communications of the ACM. 1970. 13. N 6. P. 377-387.
Broekstra J., Kampman A., Van Harmelen F. Sesame: a generic architecture for storing and querying rdf and rdf schema // International Semantic Web Conference. Berlin; Heidelberg: Springer Berlin Heidelberg, 2002. P. 54-68.
Lancichinetti A., Fortunato S., Radicchi F. Benchmark graphs for testing community detection algorithms // Physical Review E-Statistical, Nonlinear, and Soft Matter Physics, 2008. 78. N 4. P. 046110.
Clauset A., Newman M.E.J., Moore C. Finding community structure in very large networks // Physical Review E-Statistical, Nonlinear, and Soft Matter Physics. 2004. 70. N 6. P. 066111.
Newman M.E.J. Fast algorithm for detecting community structure in networks // Physical Review E-Statistical, Nonlinear, and Soft Matter Physics. 2004. 69. N 6. P. 066133.
Asur S., Huberman B.A. Predicting the future with social media // 2010 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology. IEEE, 2010. 1. P. 492-499.
Lica L., Tuta M. Predicting product performance with social media // Informatica Economica. 2011. 15. N 2. P. 46.
Szabo G., Huberman B.A. Predicting the popularity of online content // Communications of the ACM. 2010. 53. N 8. P. 80–88.
Sharda R., Delen D. Predicting box-office success of motion pictures with neural networks // Expert Systems with Applications, 2006, 30. N 2. P. 243-254.
Kak S., Chen Y., Wang L. Data mining using surface and deep agents based on neural networks. // Proceedings of the Sixteenth Americas Conference on Information Systems. IEEE, 2010. P. 1–7.
Mutlu E.C. et al. Review on graph feature learning and feature extraction techniques for link prediction // arXiv preprint arXiv:1901.03425. 2019. P. 38.
Guimera R., Sales-Pardo M. Missing and spurious interactions and the reconstruction of complex networks // Proceedings of the National Academy of Sciences, 2009. 106. N 52. P. 22073-22078.
Huberman B.A., Romero D.M., Wu F. Social networks that matter: Twitter under the microscope // arXiv preprint arXiv:0812.1045, 2008.
Hinds P., McGrath C. Structures that work: social structure, work structure and coordination ease in geographically distributed teams // Proceedings of the 2006 20th Anniversary Conference on Computer Supported Cooperative Work. IEEE, 2006. P. 343–352.
Lazega E. Structural holes: the social structure of competition // Revue Francaise de Sociologie. 1995. 36. N 4. P. 779-781.
Scripps J., Tan P.N., Esfahanian A.H. Node roles and community structure in networks //I Proceedings of the 1st SNA-KDD 2007 workshop on Web mining and social network analysis. 2007. P. 26-35.
Martinez V., Berzal F., Cubero J.C. A survey of link prediction in complex networks // ACM computing surveys (CSUR). 2016. 49. N 4. P. 1-33.
Zhang M., Chen Y. Weisfeiler-lehman neural machine for link prediction // Proceedings of The 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. IEEE, 2017. P. 575–583.
Ding Y. Synthesis Lectures on the Semantic Web: Theory and Technology. San Rafael: Morgan & Claypool, 2012.
Qin X. et al. User OCEAN personality model construction method using a BP neural network // Electronics, 2022. 11. N 19. P. 3022.
Kadyrbek N., Sundetova Z., Torekul S. Information monitoring system of social wellness opinions // 2020 IEEE 8th Workshop on Advances in Information, Electronic and Electrical Engineering (AIEEE), IEEE, 2021. P. 1-4.
Karyukin V., Zhumabekova A., Yessenzhanova S. Machine learning and neural network methodologies of analyzing social media // Proceedings of the 6th International Conference on Engineering & MIS 2020. IEEE, 2020. P. 1-7.
Pereira-Kohatsu J.C. et al. Detecting and monitoring hate speech in Twitter // Sensors, 2019. 19. N 21. P. 4654.
Rashmi C., Kodabagi M.M. Profiling of social network users using proximity measures // 2020 International Conference on Smart Technologies in Computing, Electrical and Electronics (ICSTCEE). IEEE, 2020. P. 24-28.
Florea M. et al. Complex project to develop real tools for identifying and countering terrorism: real-time early detection and alert system for online terrorist content based on natural language processing, social network analysis, artificial intelligence and complex event processing // Challenges in Cybersecurity and Privacy. The European Research Landscape. River Publishers, 2022. P. 181-206.
Gorokhov O., Petrovskiy M., Mashechkin I., Kazachuk M. Fuzzy CNN autoencoder for unsupervised anomaly detection in log data // Mathematics. 2023. 11. N 18. P. 3995.
Zhuravskii M., Kaza chuk M., Petrovskiy M., Mashechkin I. Continuous keystroke dynamics-based user authentication using modified hausdorff distance // Database Systems for Advanced Applications 2021. Springer International Publishing, 2021. P. 223–236.
Berezniker A., Kazachuk M., Mashechkin I, Petrovskiy M., Popov I. User behavior authentication based on computer mouse dynamics // Moscow University Computational Mathematics and Cybernetics. 2021. 45. N 4. P. 135-147.
Kazachuk M., Petrovskiy M., Mas hechkin I, Gorokhov O. Outlier detection in complex structured event streams // Moscow University Computational Mathematics and Cybernetics. 2019. 43. N 3. P. 101-111.
Mashechkin I., Petrovskiy M., Popov I. Software system for users continuous identification based on behavioral information about the work with standard input devices // Lobachevskii Journal of Mathematics. 2019. 40. P. 1809-1816.
Kazachuk M., Petrovskiy M., Mashechkin I., Gorokhov O. Novelty detection using elliptical fuzzy clustering in a reproducing kernel Hilbert space // Intelligent Data Engineering and Automated Learning. IDEAL 2018. Springer International Publishing, 2018. P. 221–232.
Kazachuk M., Kovalchuk A., Mashechkin I., Orpanen I., Petrovskiy M., Popov I, Zakliakov R. One-class models for continuous authentication based on keystroke dynamics // Intelligent Data Engineering and Automated Learning - IDEAL 2016. Springer International Publishing, 2016. P. 416-425.
Kaganov V., Korolev A., Krylov M., Mashechkin I., Petrovskiy M. Machine learning methods in authentication problems using password keystroke dynamics // Computational Mathematics and Modeling. 2015. 26. N 3. P. 398–407.
Mashechkin I., Petrovskiy M., Popov D., Tsarev D. Applying text mining methods for data loss prevention // Programming and Computer Software. 2015. 41. P. 23–30.
Королев В., Корчагин А., Машечкин И., Петровский М., Царев Д. Применение временных рядов в задаче фоновой идентификации пользователей на основе анализа их работы с текстовыми данными // Труды Института системного программирования РАН. 2015. 27. № 1. Р. 151-172.
Tsarev D., Kurynin R., Petrovskiy M., Mashechkin I. Applying non-negative matrix factorization methods to discover user's resource access patterns for computer security tasks // 2014 14th International Conference on Hybrid Intelligent Systems. IEEE, 2014. P. 43-48.
Kaganov V., Korolyov A., Krylov M., Petrovskiy M., Mashechkin I. Hybrid method for active authentication using keystroke dynamics // 2014 14th International Conference on Hybrid Intelligent Systems. IEEE, 2014. P. 61–66.
Машечкин И., Петровский М., Царев Д. Методы вычисления релевантности фрагментов текста на основе тематических моделей в задаче автоматического аннотирования // Вычислительные методы и программирование, 2013. 14. № 1. Р. 91-102.
Герасимов С., Курынин Р., Машечкин И., Петровский М., Царев Д., Шестимеров А. Инструментальные средства оценки качества научно-технических документов // Труды Института системного программирования РАН. 2013. 24. Р. 359-380.
Mashechkin I., Petrovskiy M., Popov D., Tsarev D. Automatic text summarization using latent semantic analysis // Programming and Computer Software. 2011. 37. P. 299-305.
Tsarev D., Petrovskiy M., Mashechkin I. Using NMF-based text summarization to improve supervised and unsupervised classification // 2011 11th International Conference on Hybrid Intelligent Systems (HIS). IEEE, 2011. P. 185–189.
Tsarev D., Petrovskiy M., Mas hechkin I. Text summarization method based on normalized non-negative matrix factorization // 3rd International Conference on Mechanical and Electrical Technology (ICMET-China 2011). ASME Press, 2011. P. 563-568.
Mashechkin I., Petrovskii M., Tsarev D. Machine learning methods for analyzing user behavior when accessing text data in information security problems // Moscow University Computational Mathematics and Cybernetics. 2016. 40. N 4. P. 179–184.
Gorokhov O., Petrovskiy M., Mashechkin I. Convolutional neural networks for unsupervised anomaly detection in text data // International Conference on Intelligent Data Engineering and Automated Learning. Cham: Springer International Publishing, 2017. P. 500–507.
Petrovskiy M., Chikunov M. Online extremism discovering through social network structure analysis // 2019 IEEE 2nd International Conference on Information and Computer Technologies (ICICT). IEEE, 2019. P. 243-249.
Mashechkin I., Petrovskiy M., Tsarev D., Chikunov M. Machine learning methods for detecting and monitoring extremist information on the internet // Programming and Computer Software. 2019. 45. P. 99-115.
Petrovskiy M., Tsarev D., Pospelova I. Pattern based information retrieval approach to discover extremist information on the Internet // Mining Intelligence and Knowledge Exploration: 5th International Conference. MIKE 2017. Springer International Publishing, 2017. P. 240-249.
Машечкин И., Петровский М. Система мониторинга работы пользователей с информационными ресурсами корпоративной компьютерной сети на основе моделирования поведения пользователей с целью поиска аномалий и изменений в работе. Патент № 105042. РФ. 2010.
Глазкова В., Машечкин И., Петровский М. Система анализа и фильтрации Интернет- трафика на основе методов классификации многотемных документов. Патент № 105758. РФ. 2010.
Герасимов С., Курынин Р., Машечкин И., Петровский М., Терехин А., Царев Д. Шестимеров А. Интеллектуальная система оценки качества научно-технических документов. Патент № 132587. РФ. 2013.
Машечкин И., Никифоров Д., Петровский М., Попов И., Терехин А. Система двух факторной аутентификации на основе анализа поведенческой биометрической информации об особенностях работы пользователя с компьютерной мышью. Свид. о регистрации программы для ЭВМ 2016619395. РФ. 2016.
Машечкин И., Царев Д., Петровский М., Попов И., Терехин А. Система мониторинга, теневого копирования и автоматического аннотирования текстовых данных при работе пользователя с электронными документами. Свид. о регистрации программы для ЭВМ 2016618914. РФ. 2016.
Машечкин И., Петровский М., Попов И., Терехин А., Никифоров Д. Система двух факторной аутентификации на основе анализа поведенческой биометрической информации об особенностях работы пользователя с клавиатурой компьютера. Свид. о регистрации программы для ЭВМ 2015661555. РФ. 2015.
Глазкова В., Курынин Р., Машечкин И., Петровский М., Царев Д. Система мониторинга работы пользователей с информационными ресурсами корпоративной компьютерной сети на основе поведения пользователей. Свид. о регистрации программы для ЭВМ 2014616126. РФ. 2014.
Глазкова В., Машечкин И., Петровский М., Масляков В. Система анализа и фильтрации интернет-трафика. Свид. о регистрации программы для ЭВМ 2008614494. РФ. 2008.