Підписатись
Іван Опірський, Иван Опирский, Ivan Opirskyy, Ivan Opirsky, I. Opirskyy, I.R. Opirskyy, І.Р
Іван Опірський, Иван Опирский, Ivan Opirskyy, Ivan Opirsky, I. Opirskyy, I.R. Opirskyy, І.Р
завідувач кафедри захисту інформації, Національний університет "Львівська політехніка"
Підтверджена електронна адреса в lpnu.ua - Домашня сторінка
Назва
Посилання
Посилання
Рік
Method for optimization of information security systems behavior under conditions of influences
Z Hu, Y Khokhlachova, V Sydorenko, I Opirskyy
International Journal of Intelligent Systems and Applications 9 (12), 46, 2017
652017
Synergy of building cybersecurity systems
S Yevseiev, V Ponomarenko, O Laptiev, O Milov, O Korol, S Milevskyi, ...
412021
Modification of the algorithm (OFM) S-box, which provides increasing crypto resistance in the post-quantum period
SP Yevseiev, RV Korolyov, A Tkachov, O Laptiev, I Opirskyy, O Soloviova
322020
Analysis of the attack vectors used by threat actors during the pandemic
V Susukailo, I Opirskyy, S Vasylyshyn
2020 IEEE 15th International Conference on Computer Sciences and Information …, 2020
302020
Analysis and Comparison of the NIST SP 800-53 and ISO/IEC 27001: 2013
Y Kurii, I Opirskyy
NIST Spec. Publ 800 (53), 10, 2022
272022
Development of methodology for modeling the interaction of antagonistic agents in cybersecurity systems
OV Milov, A Voitko, I Husarova, O Domaskin, I Ivanchenko, HP Kots, ...
252019
Research on Security Challenges in Cloud Environments and Solutions based on the" Security-as-Code" Approach.
O Vakhula, I Opirskyy, O Mykhaylova
CPITS II, 55-69, 2023
182023
A multicriterial analysis of the efficiency of conservative information security systems
V Dudykevych, I Prokopyshyn, V Chekurin, I Opirskyy, Y Lakh, T Kret, ...
Восточно-Европейский журнал передовых технологий, 6-13, 2019
182019
Development of Niederreiter hybrid crypto-code structure on flawed codes
S Yevseiev, O Tsyhanenko, A Gavrilova, V Guzhva, O Milov, ...
Восточно-Европейский журнал передовых технологий, 27-38, 2019
182019
Modeling of security systems for critical infrastructure facilities
S Yevseiev, R Hryshchuk, K Molodetska, M Nazarkevych, V Hrytsyk, ...
PC TECHNOLOGY CENTER, 2022
162022
Formation of requirements for the electronic record-book in guaranteed information systems of distance learning
H Hulak, L Kriuchkova, P Skladannyi, I Opirskyy
Cybersecurity Providing in Information and Telecommunication Systems 2021 …, 2021
162021
Models of socio-cyber-physical systems security
S Yevseiev, Y Khokhlachova, S Ostapov, O Laptiev, O Korol, S Milevskyi, ...
152023
Development of a modification of the method for constructing energy-efficient sensor networks using static and dynamic sensors
V Petrivskyi, V Shevchenko, S Yevseiev, O Milov, O Laptiev, O Bychkov, ...
Eastern-European journal of enterprise technologies 1 (9), 115, 2022
152022
A model of decoy system based on dynamic attributes for cybercrime investigation
S Vasylyshyn, V Susukailo, I Opirskyy, Y Kurii, I Tyshyk
Eastern-European Journal of Enterprise Technologies 1 (9), 121, 2023
132023
Management of information protection based on the integrated implementation of decision support systems
V Lakhno, V Kozlovskyi, Y Boiko, A Mishchenko, I Opirskyy
Восточно-Европейский журнал передовых технологий, 36-42, 2017
132017
METHOD OF ASSESSMENT OF FREQUENCY RESOLUTION FOR AIRCRAFT.
S Yevseiev, S Herasymov, O Kuznietsov, I Opirskyy, A Volkov, Y Peleshok, ...
Eastern-European Journal of Enterprise Technologies 122 (9), 2023
112023
Methodology of ISMS establishment against modern cybersecurity threats
V Susukailo, I Opirsky, O Yaremko
Future Intent-Based Networking: On the QoS Robust and Energy Efficient …, 2021
112021
Analysis of Problems and Prospects of Implementation of Post-Quantum Cryptographic Algorithms.
A Horpenyuk, I Opirskyy, P Vorobets
CQPC, 39-49, 2023
102023
Analysis of the use of software baits as a means of ensuring information security
S Vasylyshyn, I Opirskyy, V Susukailo
2020 IEEE 15th International Conference on Computer Sciences and Information …, 2020
102020
Detection of MAC spoofing attacks in IEEE 802.11 networks using signal strength from attackers’ devices
R Banakh, A Piskozub, I Opirskyy
Advances in Computer Science for Engineering and Education 13, 468-477, 2019
102019
У даний момент система не може виконати операцію. Спробуйте пізніше.
Статті 1–20