Подписаться
Іван Опірський, Иван Опирский, Ivan Opirskyy, Ivan Opirsky, I. Opirskyy, I.R. Opirskyy, І.Р
Іван Опірський, Иван Опирский, Ivan Opirskyy, Ivan Opirsky, I. Opirskyy, I.R. Opirskyy, І.Р
завідувач кафедри захисту інформації, Національний університет "Львівська політехніка"
Подтвержден адрес электронной почты в домене lpnu.ua - Главная страница
Название
Процитировано
Процитировано
Год
Method for optimization of information security systems behavior under conditions of influences
Z Hu, Y Khokhlachova, V Sydorenko, I Opirskyy
International Journal of Intelligent Systems and Applications 9 (12), 46, 2017
652017
Synergy of building cybersecurity systems
S Yevseiev, V Ponomarenko, O Laptiev, O Milov, O Korol, S Milevskyi, ...
402021
Modification of the algorithm (OFM) S-box, which provides increasing crypto resistance in the post-quantum period
SP Yevseiev, RV Korolyov, A Tkachov, O Laptiev, I Opirskyy, O Soloviova
322020
Analysis of the attack vectors used by threat actors during the pandemic
V Susukailo, I Opirskyy, S Vasylyshyn
2020 IEEE 15th International Conference on Computer Sciences and Information …, 2020
302020
Analysis and Comparison of the NIST SP 800-53 and ISO/IEC 27001: 2013
Y Kurii, I Opirskyy
NIST Spec. Publ 800 (53), 10, 2022
272022
Development of methodology for modeling the interaction of antagonistic agents in cybersecurity systems
OV Milov, A Voitko, I Husarova, O Domaskin, I Ivanchenko, HP Kots, ...
252019
A multicriterial analysis of the efficiency of conservative information security systems
V Dudykevych, I Prokopyshyn, V Chekurin, I Opirskyy, Y Lakh, T Kret, ...
Восточно-Европейский журнал передовых технологий, 6-13, 2019
182019
Research on Security Challenges in Cloud Environments and Solutions based on the" Security-as-Code" Approach.
O Vakhula, I Opirskyy, O Mykhaylova
CPITS II, 55-69, 2023
172023
Development of Niederreiter hybrid crypto-code structure on flawed codes
S Yevseiev, O Tsyhanenko, A Gavrilova, V Guzhva, O Milov, ...
Восточно-Европейский журнал передовых технологий, 27-38, 2019
172019
Modeling of security systems for critical infrastructure facilities
S Yevseiev, R Hryshchuk, K Molodetska, M Nazarkevych, V Hrytsyk, ...
PC TECHNOLOGY CENTER, 2022
162022
Formation of requirements for the electronic record-book in guaranteed information systems of distance learning
H Hulak, L Kriuchkova, P Skladannyi, I Opirskyy
Cybersecurity Providing in Information and Telecommunication Systems 2021 …, 2021
162021
Models of socio-cyber-physical systems security
S Yevseiev, Y Khokhlachova, S Ostapov, O Laptiev, O Korol, S Milevskyi, ...
152023
A model of decoy system based on dynamic attributes for cybercrime investigation
S Vasylyshyn, V Susukailo, I Opirskyy, Y Kurii, I Tyshyk
Eastern-European Journal of Enterprise Technologies 1 (9), 121, 2023
132023
Development of a modification of the method for constructing energy-efficient sensor networks using static and dynamic sensors
V Petrivskyi, V Shevchenko, S Yevseiev, O Milov, O Laptiev, O Bychkov, ...
Eastern-European journal of enterprise technologies 1 (9), 115, 2022
132022
Management of information protection based on the integrated implementation of decision support systems
V Lakhno, V Kozlovskyi, Y Boiko, A Mishchenko, I Opirskyy
Восточно-Европейский журнал передовых технологий, 36-42, 2017
132017
METHOD OF ASSESSMENT OF FREQUENCY RESOLUTION FOR AIRCRAFT.
S Yevseiev, S Herasymov, O Kuznietsov, I Opirskyy, A Volkov, Y Peleshok, ...
Eastern-European Journal of Enterprise Technologies 122 (9), 2023
112023
Methodology of ISMS establishment against modern cybersecurity threats
V Susukailo, I Opirsky, O Yaremko
Future Intent-Based Networking: On the QoS Robust and Energy Efficient …, 2021
112021
Analysis of the use of software baits as a means of ensuring information security
S Vasylyshyn, I Opirskyy, V Susukailo
2020 IEEE 15th International Conference on Computer Sciences and Information …, 2020
102020
Інформаційно-психологічне протиборство в Україні
ММ Браіловський, ІС Іванченко, ІР Опірський, ВО Хорошко
Ukrainian Scientific Journal of Information Security 25 (3), 144-149, 2019
102019
Аналіз апаратної підтримки криптографії у пристроях інтернету речей
Я Совин, Ю Наконечний, І Опірський, М Стахів
Безпека інформації, 36-48, 2018
102018
В данный момент система не может выполнить эту операцию. Повторите попытку позднее.
Статьи 1–20