Design of adaptive system of detection of cyber-attacks, based on the model of logical procedures and the coverage matrices of features V Lakhno, S Kazmirchuk, Y Kovalenko, L Myrutenko, T Zhmurko Восточно-Европейский журнал передовых технологий, 30-38, 2016 | 33 | 2016 |
Detection of sql injection attack using neural networks O Hubskyi, T Babenko, L Myrutenko, O Oksiiuk International scientific-practical conference, 277-286, 2020 | 16 | 2020 |
Developing of the cyber security system based on clustering and formation of control deviation signs VA Lakhno, PU Kravchuk, VP Malyukov, VN Domrachev, LV Myrutenko, ... Journal of Theoretical and Applied Information Technology 95 (21), 5778-5786, 2017 | 15 | 2017 |
Prioritizing Cybersecurity Measures with Decision Support Methods Using Incomplete Data. H Hnatiienko, NA Kiktev, T Babenko, A Desiatko, L Myrutenko ITS, 169-180, 2021 | 12 | 2021 |
Model of information security critical incident risk assessment D Palko, L Myrutenko, T Babenko, A Bigdan 2020 IEEE International Conference on Problems of Infocommunications …, 2020 | 9 | 2020 |
Eliminating privilage escalation to root in containers running on kubernetes L Artem, B Tetiana, M Larysa, V Vira Scientific and practical cyber security journal, 2020 | 8 | 2020 |
Аналіз надання освітніх послуг дистанційної форми навчання в Україні ЛВ Мирутенко Наукові записки Українського науково - дослідного інституту зв’язку, 112–118, 2014 | 4 | 2014 |
Optimization of lifetime in wireless monitoring networks Y Kovalova, T Babenko, O Oksiiuk, L Myrutenko International Journal of Computing 19 (2), 267-272, 2020 | 3 | 2020 |
Secure software developing recommendations V Grechko, T Babenko, L Myrutenko 2019 IEEE International Scientific-Practical Conference Problems of …, 2019 | 3 | 2019 |
Система оцінки якості дистанційної освіти в Україні: основні проблеми і задачі ЛВ Мирутенко Системи обробки інформації, 260-263, 2016 | 3 | 2016 |
Detection of sql injection attack using neural networks L Myrutenko, O Oksiiuk Mathematical Modeling and Simulation of Systems (MODS’2020): Selected Papers …, 2020 | 2 | 2020 |
Formation of the Method of Branched its Power Distribution by Activities and Specifics of Work O Oleksandr, L Myrutenko, Y Shestak, G Viktoria 2018 International Scientific-Practical Conference Problems of …, 2018 | 2 | 2018 |
An Intelligent Cloud‐based System for Conduction of an Enrollment Campaign H Hnatiienko, O Ilarionov, L Myrutenko, O Vlasenko, S Gamotska CEUR Workshop 3503, 161-176, 2022 | 1 | 2022 |
Безпечне програмне забезпечення, що розробляє рекомендації V Grechko, T Babenko, L Myrutenko Електронне фахове наукове видання «Кібербезпека: освіта, наука, техніка» 2 …, 2019 | 1 | 2019 |
The purpose and task of building complex distributed systems, the parameters of stability and security in the formation of the system development goals of itcs Y Shestak, V Vialkova, SML Myrutenko Scientific and practical cyber security journal, 2018 | 1 | 2018 |
Методика оптимізації комплексу програмного забезпечення систем дистанційного навчання ЛВ Мирутенко Вісник ЖДТУ. Серія" Технічні науки", 106-110, 2015 | 1 | 2015 |
Method for Determining the Level of Criticality Elements when Ensuring the Functional Stability of the System based on Role Analysis of Elements H Hnatiienko, V Hnatiienko, R Zulunov, T Babenko, L Myrutenko | | 2024 |
Detection of Cybersecurity Events Based on Entropy Analysis A Bigdan, T Babenko, H Hnatiienko, O Baranovskyi, L Myrutenko 7th International Conference on Digital Technologies in Education, Science …, 2022 | | 2022 |
Method of Early Detection of Information Security Anomalies and Incidents in Information Systems H Hnatiienko, T Babenko, Y Kovalova, L Myrutenko | | 2022 |
OPRACOWANIE METODYKI ROZWOJU SPRZĘTOWYCH TECHNIK RÓWNOWAŻENIA OBCIĄŻENIA ROZPROSZONYCH SIECI INFORMACYJNYCH Y SHESTAK, L MYRUTENKO Optimization 1, 5, 2019 | | 2019 |