Follow
Îëåøêî ².Â.| Oleshko I.V.
Îëåøêî ².Â.| Oleshko I.V.
Khark³v National University of Radio Electronics
Verified email at nure.ua
Title
Cited by
Cited by
Year
Performance analysis of cryptographic hash functions suitable for use in blockchain
A Kuznetsov, I Oleshko, V Tymchenko, K Lisitsky, M Rodinko, A Kolhatin
International Journal of Computer Network & Information Security 13 (2), 1-15, 2021
252021
Biometric Authentication Using Convolutional Neural Networks
A Kuznetsov, I Oleshko, K Chernov, M Bagmut, T Smirnova
Advances in Information and Communication Technology and Systems 152, 85, 2020
92020
Key Generation from Biometric Data of Iris
M Lutsenko, A Kuznetsov, Y Gorbenko, I Oleshko, Y Pronchakov, ...
2019 International Conference on Information and Telecommunication …, 2020
52020
Ìîäåë³ òà ìåòîäè îö³íêè çàõèùåíîñò³ ìåõàí³çì³â áàãàòîôàêòîðíî¿ àâòåíòèô³êàö³¿ â³ä íåñàíêö³îíîâàíîãî äîñòóïó
²Â Îëåøêî
22014
MODELS AND METHODS FOR ASSESSING THE SECURITY OF MULTI-FACTOR AUTHENTICATION MECHANISMS.
Y Gorbenko, I Oleshko
Eastern-European Journal of Enterprise Technologies 6 (2), 2013
22013
Ïîð³âíÿëüíèé àíàë³ç ìåòîä³â á³îìåòðè÷íî¿ àâòåíòèô³êàö³¿ íà îñíîâ³ êðèòåð³þ â³äíîñíî¿ åíòðîﳿ
²Â Îëåøêî
³ñíèê íàö³îíàëüíîãî óí³âåðñèòåòó «Ëüâ³âñüêà ïîë³òåõí³êà, 170-175, 2012
22012
Biometric Images Attacks Detecting Using Convolutional Neural Networks.
K Chernov, K Kuznetsova, I Oleshko, M Bagmut, A Fedorchuk, ...
CybHyg, 107-121, 2019
12019
Àíàë³ç åôåêòèâíîñò³ ñêàíåðó OpenVAS òà éîãî âäîñêîíàëåííÿ
 Ñêëÿðîâ, ²Â Îëåøêî
2023
Ïîð³âíÿííÿ ïîøèðåíèõ õìàðíèõ ñõîâèù çà êðèòåð³ºì áåçïåêè
ÄÎ ×åïåíêî, ²Â Îëåøêî
2023
Äâîôàêòîðíà àâòåíòèô³êàö³ÿ òà àâòîðèçàö³ÿ êîðèñòóâà÷à ó âåá-äîäàòêó
Ò Ïòàùåíêî, ²Â Îëåøêî
2023
Äîñë³äæåííÿ ³íôîðìàö³éíî-êîìï’þòåðíî¿ ñèñòåìè íà íàÿâí³ñòü âðàçëèâîñòåé
ÀÎ Êðàâåöü, ²Â Îëåøêî
2022
Measuring Vulnerabilities in Threat Modelling with Risk Matrix
A Hapon, V Fedorchenko, V Martovytskyi, V Rykun, O Sievierinov, ...
2021 IEEE 8th International Conference on Problems of Infocommunications …, 2021
2021
Ïðîåêòóâàííÿ òà ðîçðîáêà çàõèùåíîãî ìîá³ëüíîãî äîäàòêó îïîâ³ùåííÿ âàæëèâîþ ³íôîðìàö³ºþ
ÂÐ Êðèã³í, ²Â Îëåøêî
ÕÍÓÐÅ, 2021
2021
Suricata intrusion detection and prevention system and its comparative analysis
I Oleshko, O Rykov
COMPUTER AND INFORMATION SYSTEMS AND TECHNOLOGIES, 2020
2020
ÑÏÓÔ²ÍÃ-ÀÒÀÊÈ ÍÀ Á²ÎÌÅÒÐÈ×Ͳ ÑÈÑÒÅÌÈ ÀÂÒÅÍÒÈÔ²ÊÀÖ²¯ ÒÀ ÌÅÒÎÄÈ ÏÐÎÒÈIJ¯ ÀÒÀÊÀÌ
À Êóñòîâ, ² Îëåøêî
Ðàä³îåëåêòðîí³êà ³ ìîëîäü ó 21 ñòîë³òò³ 5, 76-77, 2020
2020
Convolutional Neural Networks for Detecting Biometric Images Attacks
A Kuznetsov, I Oleshko, K Chernov, M Bagmut
ISCI’2019: INFORMATION SECURITY IN CRITICAL INFRASTRUCTURES, 396, 2019
2019
BIOMETRIC IMAGES ATTACKS DETECTING USING CONVOLUTIONAL NEURAL NETWORKS
A Kuznetsov, I Oleshko, K Chernov, M Bagmut
ISCI’2019: INFORMATION SECURITY IN CRITICAL INFRASTRUCTURES, 396-411, 2019
2019
Ïîð³âíÿëüíèé àíàë³ç ñèñòåì âèÿâëåííÿ ³ çàïîá³ãàííÿ âòîðãíåíü
Î Ðèêîâ, ² Îëåøêî
GLOBAL CYBER SECURITY FORUM, 88-89, 2019
2019
Biometric Authentication Systems
N Kuleba, IV Oleshko, KT Umyarov
2014
Analysis of NESSIE Project Block Ciphers
M Lutsenko, IV Oleshko, KT Umyarov
2014
The system can't perform the operation now. Try again later.
Articles 1–20