Follow
Öóðêàí Îêñàíà Âîëîäèìèð³âíà, Tsurkan Oksana
Öóðêàí Îêñàíà Âîëîäèìèð³âíà, Tsurkan Oksana
²íñòèòóò ïðîáëåì ìîäåëþâàííÿ â åíåðãåòèö³ ³ì. Ã.ª. Ïóõîâà ÍÀÍ Óêðà¿íè
Verified email at ipme.kiev.ua
Title
Cited by
Cited by
Year
Information security assessment of computer systems by socio-engineering approach
VV Mokhor, OV Tsurkan, RP Herasymov, VV Tsurkan
CEUR Workshop Proceedings, 92-98, 2017
122017
Presentation the interaction of the subject and the object of socio-engineering influence with a social graph
O Kruk, R Herasymov, O Tsurkan
COMPUTER AND INFORMATION SYSTEMS AND TECHNOLOGIES, 2020
82020
Methods of counteracting social engineering
O Tsurkan, R Herasymov, O Kruk
Collection" Information Technology and Security" 7 (2), 161-170, 2019
42019
Ìåòîä àíàë³çóâàííÿ óðàçëèâîñòåé ñîö³îòåõí³÷íèõ ñèñòåì äî âïëèâ³â ñîö³àëüíî¿ ³íæåíåð³¿
ÐÏ Ãåðàñèìîâ, ÎÌ Êðóê, ÎÂ Öóðêàí, ÂÏ ßøåíêîâ
Institute of Special Communication and Information Protection of National …, 2020
32020
Model of vulnerabilities analysis of socio-technical systems to the social engineering influences
V Mokhor, O Tsurkan, R Herasymov, O Kruk, V Pokrovska
Cybersecurity: Education, Science, Technique 4 (8), 165-173, 2020
22020
Íåãàòèâíèé ³íôîðìàö³éíî-ïñèõîëîã³÷íèé âïëèâ íà ³íäèâ³äóàëüíó ñâ³äîì³ñòü çà ñîö³î³íæåíåðíèì ï³äõîäîì
V Mokhor, O Tsurkan
Collection" Information Technology and Security" 5 (2), 13-19, 2017
12017
Ìîõîð Âîëîäèìèð Âîëîäèìèðîâè÷
ÂÂ Öóðêàí
ÁÁÊ 31 Ê-381, 44, 2021
2021
Method of vulnerabilities analysis of socio-technical systems to the social engineering influences
R Herasymov, O Kruk, O Tsurkan, V Yashenkov
Collection" Information Technology and Security" 8 (1), 31-39, 2020
2020
ÌÎÄÅËÜ ÀÍÀ˲ÇÓÂÀÍÍß ÓÐÀÇËÈÂÎÑÒÅÉ ÑÎÖ²ÎÒÅÕͲ×ÍÈÕ ÑÈÑÒÅÌ ÄÎ ÂÏËȲ ÑÎÖ²ÀËÜÍί ²ÍÆÅÍÅв¯
V Mokhor, O Tsurkan, R Herasymov, O Kruk, V Pokrovska
Åëåêòðîííå ôàõîâå íàóêîâå âèäàííÿ «Ê³áåðáåçïåêà: îñâ³òà, íàóêà, òåõí³êà» 4 …, 2020
2020
Presentation the interaction of the subject and the object of socio-engineering influence with a social graph
OV Tsurkan, RP Herasymov, OM Kruk
Proc. Fourth International Scientific and Technical Conference Computer and …, 2020
2020
Detection of vulnerabilities of the computer systems and networks using social engineering techniques
O Tsurkan, R Herasymov
Institute of Special Communication and Information Protection of National …, 2018
2018
ÌÀͲÏÓËßÒÈÂÍÀ ÔÎÐÌÀ ÑÎֲβÍÆÅÍÅÐÍÎÃÎ ÂÏËÈÂÓ ÍÀ ÎÑÎÁÈÑÒ²ÑÒÜ Â Ê²ÁÅÐÏÐÎÑÒÎв
ÂÂ Ìîõîð, ÎÂ Öóðêàí, ÐÏ Ãåðàñèìîâ
ÀÊÒÓÀËÜͲ ÏÐÎÁËÅÌÈ ÓÏÐÀÂ˲ÍÍß ²ÍÔÎÐÌÀÖ²ÉÍÎÞ ÁÅÇÏÅÊÎÞ ÄÅÐÆÀÂÈ, 303, 2015
2015
Ïñèõîëîãè÷åñêàÿ îöåíêà êàê ìåðà ïðåäîòâðàùåíèÿ âîçäåéñòâèé ìåòîäîâ ñîöèàëüíîé èíæåíåðèè íà ñîòðóäíèêîâ îðãàíèçàöèè
ÐÏ Ãåðàñèìîâ, ÎÍ Êðóê, ÎÂ Öóðêàí
Ìîäåëþâàííÿ òà ³íôîðìàö³éí³ òåõíîëî㳿, 2010
2010
Àíàëèç êîãíèòèâíîãî äèññîíàíñà ïîíÿòèéíîé áàçû â ñôåðå óïðàâëåíèÿ ðèñêàìè áåçîïàñíîñòè èíôîðìàöèè
ÂÂ Ìîõîð, ÀÌ Áîãäàíîâ, ÎÍ Êðóê, ÂÂ Öóðêàí, ÎÂ Öóðêàí
Ìîäåëþâàííÿ òà ³íôîðìàö³éí³ òåõíîëî㳿, 2010
2010
Îñîáåííîñòè ïðèìåíåíèÿ ìåòîäîâ ñîöèàëüíîé èíæåíåðèè íà ýòàïå àóäèòà ñáîðà è àíàëèçà èíôîðìàöèè ñ âíåøíåé ñðåäû
ÎÂ Öóðêàí
Ìîäåëþâàííÿ òà ³íôîðìàö³éí³ òåõíîëî㳿, 2009
2009
ÊÎÍÒÐÎËÜ ÏÑÈÕÎËÎò×ÍÎÃÎ ÑÒÀÍÓ ÄÇÞÄίÑҲ ÂÈÙί ÑÏÎÐÒÈÂÍί ÊÂÀ˲ԲÊÀÖ²¯ Ï²Ä ×ÀÑ ÑÏÎÐÒÈÂÍί IJßËÜÍÎÑÒ²
ÎÂ Öóðêàí
вÂͲ ÀÍÀ˲ÇÓÂÀÍÍß ÓÐÀÇËÈÂÎÑÒÅÉ ÑÎÖ²ÎÒÅÕͲ×ÍÈÕ ÑÈÑÒÅÌ ÄÎ ÂÏËȲ ÑÎÖ²ÀËÜÍί ²ÍÆÅÍÅв¯
ÎÂ Öóðêàí, ÐÏ Ãåðàñèìîâ, ÂÏ ßøåíêîâ, ÒÌ Êëèìåíêî
ÀÍÀË²Ç ÑÎֲβÍÆÅÍÅÐÍÈÕ ÀÒÀÊ ÍÀ ËÞÄÈÍÓ Â Ê²ÁÅÐÏÐÎÑÒÎв
ÂÂ Ìîõîð, ÎÂ Öóðêàí
Îö³íþâàííÿ çàõèùåíîñò³ ³íôîðìàö³¿ â êîìï’þòåðíèõ ñèñòåìàõ çà ñîö³î³íæåíåðíèì ï³äõîäîì
ÂÂ Ìîõîð, ÎÂ Öóðêàí, ÂÂ Öóðêàí, ÐÏ Ãåðàñèìîâ
The system can't perform the operation now. Try again later.
Articles 1–19