Performance analysis of cryptographic hash functions suitable for use in blockchain A Kuznetsov, I Oleshko, V Tymchenko, K Lisitsky, M Rodinko, A Kolhatin International Journal of Computer Network & Information Security 13 (2), 1-15, 2021 | 25 | 2021 |
Biometric Authentication Using Convolutional Neural Networks A Kuznetsov, I Oleshko, K Chernov, M Bagmut, T Smirnova Advances in Information and Communication Technology and Systems 152, 85, 2020 | 9 | 2020 |
Key Generation from Biometric Data of Iris M Lutsenko, A Kuznetsov, Y Gorbenko, I Oleshko, Y Pronchakov, ... 2019 International Conference on Information and Telecommunication …, 2020 | 5 | 2020 |
Ìîäåë³ òà ìåòîäè îö³íêè çàõèùåíîñò³ ìåõàí³çì³â áàãàòîôàêòîðíî¿ àâòåíòèô³êàö³¿ â³ä íåñàíêö³îíîâàíîãî äîñòóïó ²Â Îëåøêî | 2 | 2014 |
MODELS AND METHODS FOR ASSESSING THE SECURITY OF MULTI-FACTOR AUTHENTICATION MECHANISMS. Y Gorbenko, I Oleshko Eastern-European Journal of Enterprise Technologies 6 (2), 2013 | 2 | 2013 |
Ïîð³âíÿëüíèé àíàë³ç ìåòîä³â á³îìåòðè÷íî¿ àâòåíòèô³êàö³¿ íà îñíîâ³ êðèòåð³þ â³äíîñíî¿ åíòðîﳿ ²Â Îëåøêî ³ñíèê íàö³îíàëüíîãî óí³âåðñèòåòó «Ëüâ³âñüêà ïîë³òåõí³êà, 170-175, 2012 | 2 | 2012 |
Biometric Images Attacks Detecting Using Convolutional Neural Networks. K Chernov, K Kuznetsova, I Oleshko, M Bagmut, A Fedorchuk, ... CybHyg, 107-121, 2019 | 1 | 2019 |
Àíàë³ç åôåêòèâíîñò³ ñêàíåðó OpenVAS òà éîãî âäîñêîíàëåííÿ  Ñêëÿðîâ, ²Â Îëåøêî | | 2023 |
Ïîð³âíÿííÿ ïîøèðåíèõ õìàðíèõ ñõîâèù çà êðèòåð³ºì áåçïåêè ÄÎ ×åïåíêî, ²Â Îëåøêî | | 2023 |
Äâîôàêòîðíà àâòåíòèô³êàö³ÿ òà àâòîðèçàö³ÿ êîðèñòóâà÷à ó âåá-äîäàòêó Ò Ïòàùåíêî, ²Â Îëåøêî | | 2023 |
Äîñë³äæåííÿ ³íôîðìàö³éíî-êîìï’þòåðíî¿ ñèñòåìè íà íàÿâí³ñòü âðàçëèâîñòåé ÀÎ Êðàâåöü, ²Â Îëåøêî | | 2022 |
Measuring Vulnerabilities in Threat Modelling with Risk Matrix A Hapon, V Fedorchenko, V Martovytskyi, V Rykun, O Sievierinov, ... 2021 IEEE 8th International Conference on Problems of Infocommunications …, 2021 | | 2021 |
Ïðîåêòóâàííÿ òà ðîçðîáêà çàõèùåíîãî ìîá³ëüíîãî äîäàòêó îïîâ³ùåííÿ âàæëèâîþ ³íôîðìàö³ºþ ÂÐ Êðèã³í, ²Â Îëåøêî ÕÍÓÐÅ, 2021 | | 2021 |
Suricata intrusion detection and prevention system and its comparative analysis I Oleshko, O Rykov COMPUTER AND INFORMATION SYSTEMS AND TECHNOLOGIES, 2020 | | 2020 |
ÑÏÓÔ²ÍÃ-ÀÒÀÊÈ ÍÀ Á²ÎÌÅÒÐÈ×Ͳ ÑÈÑÒÅÌÈ ÀÂÒÅÍÒÈÔ²ÊÀÖ²¯ ÒÀ ÌÅÒÎÄÈ ÏÐÎÒÈIJ¯ ÀÒÀÊÀÌ À Êóñòîâ, ² Îëåøêî Ðàä³îåëåêòðîí³êà ³ ìîëîäü ó 21 ñòîë³òò³ 5, 76-77, 2020 | | 2020 |
Convolutional Neural Networks for Detecting Biometric Images Attacks A Kuznetsov, I Oleshko, K Chernov, M Bagmut ISCI’2019: INFORMATION SECURITY IN CRITICAL INFRASTRUCTURES, 396, 2019 | | 2019 |
BIOMETRIC IMAGES ATTACKS DETECTING USING CONVOLUTIONAL NEURAL NETWORKS A Kuznetsov, I Oleshko, K Chernov, M Bagmut ISCI’2019: INFORMATION SECURITY IN CRITICAL INFRASTRUCTURES, 396-411, 2019 | | 2019 |
Ïîð³âíÿëüíèé àíàë³ç ñèñòåì âèÿâëåííÿ ³ çàïîá³ãàííÿ âòîðãíåíü Î Ðèêîâ, ² Îëåøêî GLOBAL CYBER SECURITY FORUM, 88-89, 2019 | | 2019 |
Biometric Authentication Systems N Kuleba, IV Oleshko, KT Umyarov | | 2014 |
Analysis of NESSIE Project Block Ciphers M Lutsenko, IV Oleshko, KT Umyarov | | 2014 |