Meet Inspiring Speakers and Experts at our 3000+ Global Conference Series LLC LTD Events with over 1000+ Conferences, 1000+ Symposiums and 1000+ Workshops on Medical, Pharma, Engineering, Science, Technology and Business.

Explore and learn more about Conference Series LLC LTD : World’s leading Event Organizer

Back

Igor Kotenko

Igor Kotenko

Chief Scientist
St.Petersburg Institute for Informatics and Automation of the Russian Academy of Sciences (SPIIRAS)
Russia

Biography

Igor Kotenko is a Chief Scientist, Head of Laboratory of computer security problems of St. Petersburg Institute for Informatics and Automation of the Russian Academy of Sciences (SPIIRAS) and Head of the International Laboratory "Information security of cyber-physical systems" of St.Petersburg ITMO University. He is Prof. of computer science, Doctor of Technical Sciences, PhD. He graduated with honours from the St.Petersburg Academy of Space Engineering and the St.Petersburg Signal Academy. He is a noted scientist in research on theoretical and practical problems of information and telecommunication technologies, including artificial intelligence and multi-agent systems, data mining, big data, cyber security, communication network diagnostics, decision making support. He participated in a multitude of different research projects devoted to development of new computer technologies, and he was the Principal Investigator in more than 20 international research projects. For example, he was a project leader in the research projects from the US Air Force research department, the team leader in EU FP6 and EU FP7 Projects, and the Principal Investigator in several industrial projects for Hewlett-Packard (2006-2007), Intel (2004-2005), F-Secure (2009-2013), etc. The research performed under these contracts is concerned with innovative mathematical methods for intelligent information processing, including information storage, logical reasoning and visualization, complex system modeling and simulation, network intrusion detection, simulation of network attacks and defense, testing and security evaluation, security protocols, verification and validation of security policy, design of secured embedded systems, security information and event management, etc.

Research Interest

Artificial Intelligence, Big Data, Cyber Security