Information security assessment of computer systems by socio-engineering approach VV Mokhor, OV Tsurkan, RP Herasymov, VV Tsurkan CEUR Workshop Proceedings, 92-98, 2017 | 12 | 2017 |
Presentation the interaction of the subject and the object of socio-engineering influence with a social graph O Kruk, R Herasymov, O Tsurkan COMPUTER AND INFORMATION SYSTEMS AND TECHNOLOGIES, 2020 | 8 | 2020 |
Methods of counteracting social engineering O Tsurkan, R Herasymov, O Kruk Collection" Information Technology and Security" 7 (2), 161-170, 2019 | 4 | 2019 |
Ìåòîä àíàë³çóâàííÿ óðàçëèâîñòåé ñîö³îòåõí³÷íèõ ñèñòåì äî âïëèâ³â ñîö³àëüíî¿ ³íæåíå𳿠ÐÏ Ãåðàñèìîâ, ÎÌ Êðóê, ΠÖóðêàí, ÂÏ ßøåíêîâ Institute of Special Communication and Information Protection of National …, 2020 | 3 | 2020 |
Model of vulnerabilities analysis of socio-technical systems to the social engineering influences V Mokhor, O Tsurkan, R Herasymov, O Kruk, V Pokrovska Cybersecurity: Education, Science, Technique 4 (8), 165-173, 2020 | 2 | 2020 |
Íåãàòèâíèé ³íôîðìàö³éíî-ïñèõîëîã³÷íèé âïëèâ íà ³íäèâ³äóàëüíó ñâ³äîì³ñòü çà ñîö³î³íæåíåðíèì ï³äõîäîì V Mokhor, O Tsurkan Collection" Information Technology and Security" 5 (2), 13-19, 2017 | 1 | 2017 |
Ìîõîð Âîëîäèìèð Âîëîäèìèðîâè÷ ÂÂ Öóðêàí ÁÁÊ 31 Ê-381, 44, 2021 | | 2021 |
Method of vulnerabilities analysis of socio-technical systems to the social engineering influences R Herasymov, O Kruk, O Tsurkan, V Yashenkov Collection" Information Technology and Security" 8 (1), 31-39, 2020 | | 2020 |
ÌÎÄÅËÜ ÀÍÀ˲ÇÓÂÀÍÍß ÓÐÀÇËÈÂÎÑÒÅÉ ÑÎÖ²ÎÒÅÕͲ×ÍÈÕ ÑÈÑÒÅÌ ÄÎ ÂÏËȲ ÑÎÖ²ÀËÜÍί ²ÍÆÅÍÅв¯ V Mokhor, O Tsurkan, R Herasymov, O Kruk, V Pokrovska Åëåêòðîííå ôàõîâå íàóêîâå âèäàííÿ «Ê³áåðáåçïåêà: îñâ³òà, íàóêà, òåõí³êà» 4 …, 2020 | | 2020 |
Presentation the interaction of the subject and the object of socio-engineering influence with a social graph OV Tsurkan, RP Herasymov, OM Kruk Proc. Fourth International Scientific and Technical Conference Computer and …, 2020 | | 2020 |
Detection of vulnerabilities of the computer systems and networks using social engineering techniques O Tsurkan, R Herasymov Institute of Special Communication and Information Protection of National …, 2018 | | 2018 |
ÌÀͲÏÓËßÒÈÂÍÀ ÔÎÐÌÀ ÑÎֲβÍÆÅÍÅÐÍÎÃÎ ÂÏËÈÂÓ ÍÀ ÎÑÎÁÈÑÒ²ÑÒÜ Â Ê²ÁÅÐÏÐÎÑÒÎв  Ìîõîð, ΠÖóðêàí, ÐÏ Ãåðàñèìîâ ÀÊÒÓÀËÜͲ ÏÐÎÁËÅÌÈ ÓÏÐÀÂ˲ÍÍß ²ÍÔÎÐÌÀÖ²ÉÍÎÞ ÁÅÇÏÅÊÎÞ ÄÅÐÆÀÂÈ, 303, 2015 | | 2015 |
Ïñèõîëîãè÷åñêàÿ îöåíêà êàê ìåðà ïðåäîòâðàùåíèÿ âîçäåéñòâèé ìåòîäîâ ñîöèàëüíîé èíæåíåðèè íà ñîòðóäíèêîâ îðãàíèçàöèè ÐÏ Ãåðàñèìîâ, ÎÍ Êðóê, ΠÖóðêàí Ìîäåëþâàííÿ òà ³íôîðìàö³éí³ òåõíîëî㳿, 2010 | | 2010 |
Àíàëèç êîãíèòèâíîãî äèññîíàíñà ïîíÿòèéíîé áàçû â ñôåðå óïðàâëåíèÿ ðèñêàìè áåçîïàñíîñòè èíôîðìàöèè  Ìîõîð, ÀÌ Áîãäàíîâ, ÎÍ Êðóê,  Öóðêàí, ΠÖóðêàí Ìîäåëþâàííÿ òà ³íôîðìàö³éí³ òåõíîëî㳿, 2010 | | 2010 |
Îñîáåííîñòè ïðèìåíåíèÿ ìåòîäîâ ñîöèàëüíîé èíæåíåðèè íà ýòàïå àóäèòà ñáîðà è àíàëèçà èíôîðìàöèè ñ âíåøíåé ñðåäû ΠÖóðêàí Ìîäåëþâàííÿ òà ³íôîðìàö³éí³ òåõíîëî㳿, 2009 | | 2009 |
ÊÎÍÒÐÎËÜ ÏÑÈÕÎËÎò×ÍÎÃÎ ÑÒÀÍÓ ÄÇÞÄίÑҲ ÂÈÙί ÑÏÎÐÒÈÂÍί ÊÂÀ˲ԲÊÀÖ²¯ Ï²Ä ×ÀÑ ÑÏÎÐÒÈÂÍί IJßËÜÍÎÑÒ² ΠÖóðêàí | | |
вÂͲ ÀÍÀ˲ÇÓÂÀÍÍß ÓÐÀÇËÈÂÎÑÒÅÉ ÑÎÖ²ÎÒÅÕͲ×ÍÈÕ ÑÈÑÒÅÌ ÄÎ ÂÏËȲ ÑÎÖ²ÀËÜÍί ²ÍÆÅÍÅв¯ Î Öóðêàí, ÐÏ Ãåðàñèìîâ, ÂÏ ßøåíêîâ, ÒÌ Êëèìåíêî | | |
ÀÍÀË²Ç ÑÎֲβÍÆÅÍÅÐÍÈÕ ÀÒÀÊ ÍÀ ËÞÄÈÍÓ Â Ê²ÁÅÐÏÐÎÑÒÎв  Ìîõîð, ΠÖóðêàí | | |
Îö³íþâàííÿ çàõèùåíîñò³ ³íôîðìàö³¿ â êîìï’þòåðíèõ ñèñòåìàõ çà ñîö³î³íæåíåðíèì ï³äõîäîì  Ìîõîð, ΠÖóðêàí,  Öóðêàí, ÐÏ Ãåðàñèìîâ | | |